[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 4 Apr 2017 18:56:02 +1000
From: Patrick Webster via Fulldisclosure <fulldisclosure@...lists.org>
To: bugtraq@...urityfocus.com, fulldisclosure@...lists.org
Subject: [FD] AcoraCMS browser redirect and Cross-site scripting
vulnerabilities
https://www.osisecurity.com.au/acoracms-browser-redirect-and-cross-site-scripting-vulnerabilities.html
Date:
04-Apr-2017
Product:
AcoraCMS
Versions affected:
7.0.0.6 (known bugs from 6.0.6 are still present
http://www.digitalsec.net/stuff/explt+advs/CM3.AcoraCMS.v6.txt).
Vulnerabilities:
1) Arbitrary browser redirect:
POST /forums/login.asp HTTP/1.1
Host: [target]
Content-Type: application/x-www-form-urlencoded
Content-Length: 70
cmRedirect=//osisecurity.com.au&strForumsLoginPrefix=&username=test&password=test
HTTP/1.1 302 Object moved
Cache-Control: private
Content-Length: 141
Content-Type: text/html; Charset=utf-8
Location: //osisecurity.com.au
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Tue, 14 Jul 2015 05:13:12 GMT
2) Cross-site scripting
/AcoraCMS/Admin/interface.asp [name of an arbitrarily supplied URL parameter]
/AcoraCMS/Admin/users/password_submit.asp [username parameter]
/AcoraCMS/Admin/users/password_submit.asp [email parameter]
/forums/profile_submit.asp [FunctionName parameter]
/forums/profile_submit.asp [cmFields parameter]
/forums/profile_submit.asp [fusername parameter]
/search/Default.aspx [SearchType parameter]
/users/requestaccess.aspx [cmFields parameter]
Credit:
Discovered by Patrick Webster
Disclosure timeline:
14-Jul-2015 - Discovered during audit.
01-Sep-2015 - Reported to vendor.
04-Apr-2017 - Public disclosure.
About OSI Security:
OSI Security is an independent network and computer security auditing
and consulting company based in Sydney, Australia. We provide internal
and external penetration testing, vulnerability auditing and wireless
site audits, vendor product assessments, secure network design,
forensics and risk mitigation services.
We can be found at http://www.osisecurity.com.au/
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists