Document Title: =============== DedeCMS v7.5 SP2 - Multiple Cross Site Scripting Web Vulnerabilities References (Source): ==================== https://www.vulnerability-lab.com/get_content.php?id=2194 Release Date: ============= 2020-04-08 Vulnerability Laboratory ID (VL-ID): ==================================== 2194 Common Vulnerability Scoring System: ==================================== 4.1 Vulnerability Class: ==================== Cross Site Scripting - Non Persistent Current Estimated Price: ======================== 500€ - 1.000€ Product & Service Introduction: =============================== Welcome to use the most professional PHP website content management system in China-Zhimeng content management system, he will be your first choice for easy website building. Adopt XML name space style core templates: all templates are saved in file form, which provides great convenience for users to design templates and website upgrade transfers. The robust template tags provide strong support for webmasters to DIY their own websites. High-efficiency tag caching mechanism: Allows the caching of similar tags. When generating HTML, it helps to improve the reaction speed of the system and reduce the resources consumed by the system. (Copy of the homepage: http://www.dedecms.com/products/dedecms/downloads/) Abstract Advisory Information: ============================== The vulnerability laboratory core research team discovered multiple non-persistent cross site vulnerabilities in the official DedeCMS v5.7 SP2 (UTF8) web-application. Affected Product(s): ==================== DesDev Inc. Product: DedeCMS - Content Management System v5.7 SP2 Vulnerability Disclosure Timeline: ================================== 2020-04-08: Public Disclosure (Vulnerability Laboratory) Discovery Status: ================= Published Exploitation Technique: ======================= Remote Severity Level: =============== Medium Authentication Type: ==================== Pre auth - no privileges User Interaction: ================= Low User Interaction Disclosure Type: ================ Independent Security Research Technical Details & Description: ================================ Multiple non-persistent cross site scripting vulnerabilities has been discovered in the official DedeCMS v5.7 SP2 UTF8 web-application. The vulnerability allows remote attackers to inject own malicious script codes with non-persistent attack vector to compromise browser to web-application requests from the client-side. The cross site scripting web security vulnerabilities are located in the `filename`, `mid`, `userid`, `templet` parameters of the `tpl.php`, `mychannel_edit.php`, `file_manage_view.php`, `sys_admin_user_edit.php`, `makehtml_homepage.php` files. The request method to inject the malicious script code is GET and the attack vector of the vulnerability is non-persistent on client-side. Remote attackers are able to inject own script codes to the client-side requested vulnerable web-application parameters. The attack vector of the vulnerability is non-persistent and the request method to inject/execute is GET. The vulnerabilities are classic client-side cross site scripting vulnerabilities. Successful exploitation of the vulnerability results in session hijacking, non-persistent phishing attacks, non-persistent external redirects to malicious source and non-persistent manipulation of affected or connected application modules. Request Method(s): [+] GET Vulnerable File(s): [+] tpl.php [+] mychannel_edit.php [+] file_manage_view.php [+] sys_admin_user_edit.php [+] makehtml_homepage.php Vulnerable Parameter(s): [+] filename [+] mid [+] userid [+] templet Proof of Concept (PoC): ======================= The web vulnerabilities can be exploited by remote attackers without privileged user account and with low user interaction. For security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue. Request: Examples https://test23.localhost:8080/dede/tpl.php?acdir=default&action=edit&filename=data.html https://test23.localhost:8080/dede/mychannel_edit.php?mid=1&dopost=modifysearch https://test23.localhost:8080/dede/file_manage_view.php?fmdo=edit&filename=data.html&activepath= https://test23.localhost:8080/dede/sys_admin_user_edit.php?id=1&userid=23&dopost=delete https://test23.localhost:8080/dede/makehtml_homepage.php?dopost=view&templet=13 PoC: Payload >">%20