Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 19 Aug 2011 15:12:35 -0400 (EDT)
From: Josh Bressers <bressers@...hat.com>
To: oss-security@...ts.openwall.com
Cc: coley <coley@...re.org>
Subject: Re: CVE Request: WebsiteBaker 2.8.1 <= Cross Site
 Request Forgery (CSRF) Vulnerability

Please use CVE-2011-2934

----- Original Message -----
> 1. OVERVIEW
> 
> WebsiteBaker 2.8.1 and lower versions are vulnerable to Cross Site
> Request Forgery (CSRF).
> 
> 
> 2. BACKGROUND
> 
> WebsiteBaker is a PHP-based Content Management System (CMS) designed
> with one goal in mind: to enable its users to produce websites with
> ease.
> 
> 
> 3. VULNERABILITY DESCRIPTION
> 
> WebsiteBaker 2.8.1 and lower versions contain a flaw that allows a
> remote Cross-site Request Forgery (CSRF / XSRF) attack. The flaw
> exists because the application does not require multiple steps or
> explicit confirmation for sensitive transactions for majority of
> administrator functions such as adding new user. By using a crafted
> URL, an attacker may trick the victim into visiting to his web page to
> take advantage of the trust relationship between the authenticated
> victim and the application. Such an attack could trick the victim into
> executing arbitrary commands in the context of their session with the
> application, without further prompting or verification.
> 
> 
> 4. VERSIONS AFFECTED
> 
> 2.8.1 <=
> 
> 
> 5. PROOF-OF-CONCEPT/EXPLOIT
> 
> The following request adds an administrator.
> 
> [REQUEST]
> POST /admin/users/add.php HTTP/1.1
> Content-Type: application/x-www-form-urlencoded
> Content-Length: 193
> 
> user_id=&username_fieldname=username_abcdefg&username_abcdefg=test&password=test&password2=test&display_name=test&email=tester%40yehg.net&home_folder=&groups%5B%5D=1&active%5B%5D=1&submit=Add
> [/REQUEST]
> 
> 
> 6. SOLUTION
> 
> Upgrade to 2.8.2 or higher
> 
> 
> 7. VENDOR
> 
> WebsiteBaker Org e. V.
> http://www.websitebaker2.org/
> 
> 
> 8. CREDIT
> 
> This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
> Ethical Hacker Group, Myanmar.
> 
> 
> 9. DISCLOSURE TIME-LINE
> 
> 2011-01-26: notified vendor
> 2011-08-01: vendor released fix
> 2011-08-13: vulnerability disclosed
> 
> 
> 10. REFERENCES
> 
> Original Advisory URL:
> http://yehg.net/lab/pr0js/advisories/[websitebaker-2.8.1]_cross_site_request_forgery
> 
> 
> #yehg [2011-08-13]

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.