Aerosol Posted February 14, 2015 Report Posted February 14, 2015 Advisory: Reflecting XSS vulnerabitlies, unrestricted file upload andunderlaying CSRF in Landsknecht Adminsystems CMS v. 4.0.1 (DEV, betaversion)Advisory ID: SROEADV-2015-14Author: Steffen RösemannAffected Software: Landsknecht Adminsystems CMS v. 4.0.1 (DEV, beta version)Vendor URL: https://github.com/kneecht/adminsystemsVendor Status: will be patchedCVE-ID: -==========================Vulnerability Description:==========================Landsknecht Adminsystems CMS v. 4.0.1 (DEV, beta version) suffers fromreflecting XSS- , unrestricted file-upload and an underlayingCSRF-vulnerability.==================Technical Details:==================The content management system Landsknecht Adminsystems v. 4.0.1, which iscurrently in beta development stage, suffers from reflectingXSS-vulnerabilities, a unrestricted file-upload and an underlayingCSRF-vulnerability.==================Reflecting XSS-vulnerabilities==================A reflecting XSS vulnerability can be found in the index.php and can beabused via the vulnerable "page"-parameter. See the following example,including exploit-example:http://{TARGET}/index.php?page=home%22%3E%3Cscript%3Ealert%28document.cookie%29%3C/script%3E?=de%27Another reflecting XSS vulnerability can be found in the system.php-fileand can be exploited via the vulnerable "id" parameter:http://{TARGET}/asys/site/system.php?action=users_users&mode=edit&id=1%22%3E%3Cscript%3Ealert%281%29%3C/script%3E============================Unrestricted file-upload / Underlaying CSRF============================Registered users and administrators are able to upload arbitrary files viathe following upload-form, located here:http://{TARGET}/asys/site/files.php?action=upload&path=/As there seems not be an existing permission-model, users can read/executefiles an administrator/user uploaded and vice versa.This issue includes an underlaying CSRF-vulnerability, as a user is able toupload a malicious file and trick another user or the administrator intovisiting the link to the file.All files get uploaded here without being renamed:http://{TARGET}/upload/files/{UPLOADED_FILE}=========Solution:=========The vendor has been notified. He will provide a fix for the vulnerabilitiesto prevent people who might use it from being attacked, although he wouldnot recommend using the CMS because it is in its beta stage.====================Disclosure Timeline:====================30-Jan-2015 – found the vulnerabilities30-Jan-2015 - informed the developers (see [3])30-Jan-2015 – release date of this security advisory [without technicaldetails]30-Jan-2015 - forked Github repository of Adminsystems v. 4.0.1 to keep itavailable for other security researchers (see [4])12-Feb-2015 - release date of this security advisory12-Feb-2015 - vendor will patch the vulnerabilities12-Feb-2015 - send to FullDisclosure========Credits:========Vulnerability found and advisory written by Steffen Rösemann.===========References:===========[1] https://github.com/kneecht/adminsystems[2] http://sroesemann.blogspot.de/2015/01/sroeadv-2015-14.html[3] https://github.com/kneecht/adminsystems/issues/1[4] https://github.com/sroesemann/adminsystemsSource Quote