Aerosol Posted March 18, 2015 Report Posted March 18, 2015 724CMS 5.01 / 4.59 / 4.01 / 3.01 Information Leakage*724CMS 5.01 Multiple Information Leakage Security Vulnerabilities*Exploit Title: 724CMS Multiple Information Leakage Security VulnerabilitiesVendor: 724CMSProduct: 724CMSVulnerable Versions: 3.01 4.01 4.59 5.01Tested Version: 5.01Advisory Publication: March 14, 2015Latest Update: March 14, 2015Vulnerability Type: Information Exposure [CWE-200]CVE Reference: *Impact CVSS Severity (version 2.0):CVSS v2 Base Score: 5.0 (MEDIUM) (AV:N/AC:L/Au:N/C:P/I:N/A:N) (legend)Impact Subscore: 2.9Exploitability Subscore: 10.0Credit: Wang Jing [Mathematics, Nanyang Technological University (NTU),Singapore]*Suggestion Details:**(1) Vendor & Product Description:**Vendor:*724CMS Enterprise*Product & Vulnerable Versions:*724CMS3.014.014.595.01*Vendor URL & download:*724CMS can be got from here,http://724cms.com/*Product Introduction Overview:*724CMS is a content management system (CMS) that has large customers spreadin Canada, Japan, Korean, the United States and many others. It allowspublishing, editing and modifying content, organizing, deleting as well asmaintenance from a central interface. Meanwhile, 724CMS provides proceduresto manage workflow in a collaborative environment.*(2) Vulnerability Details:*724CMS web application has a security bug problem. It can be exploited byinformation leakage attacks - Full Path Disclosure (FPD). This may allow aremote attacker to disclose the software's installation path. While suchinformation is relatively low risk, it is often useful in carrying outadditional, more focused attacks.Several 724CMS products vulnerabilities have been found by some other bughunter researchers before. 724CMS has patched some of them. NVD is the U.S.government repository of standards based vulnerability management data(This data enables automation of vulnerability management, securitymeasurement, and compliance (e.g. FISMA)). It has published suggestions,advisories, solutions related to 724CMS vulnerabilities.*(2.1)* The first code programming flaw occurs at "index.php" page with"&Lang", "&ID" parameters.*(2.2)* The second code programming flaw occurs at "section.php" page with"&Lang", "&ID" parameters.*References:*http://tetraph.com/security/information-leakage-vulnerability/724cms-5-01-information-leakage-security-vulnerabilities/http://securityrelated.blogspot.com/2015/03/724cms-501-information-leakage-security.htmlhttp://www.inzeed.com/kaleidoscope/computer-web-security/724cms-5-01-information-leakage-security-vulnerabilities/http://diebiyi.com/articles/%E5%AE%89%E5%85%A8/724cms-5-01-information-leakage-security-vulnerabilities/https://infoswift.wordpress.com/2015/03/14/724cms-5-01-information-leakage-security-vulnerabilities/http://marc.info/?l=full-disclosure&m=142576280203098&w=4http://en.hackdig.com/wap/?id=17055--Wang Jing,Division of Mathematical Sciences (MAS),School of Physical and Mathematical Sciences (SPMS),Nanyang Technological University (NTU),Singapore.http://www.tetraph.com/wangjing/https://twitter.com/tetraphibious724CMS 5.01 / 4.59 / 4.01 / 3.01 Directory Traversal*724CMS 5.01 Directory (Path) Traversal Security Vulnerabilities*Exploit Title: 724CMS /section.php Module Parameter Directory TraversalSecurity VulnerabilitiesVendor: 724CMSProduct: 724CMSVulnerable Versions: 3.01 4.01 4.59 5.01Tested Version: 5.01Advisory Publication: March 14, 2015Latest Update: March 14, 2015Vulnerability Type: Improper Limitation of a Pathname to a RestrictedDirectory ('Path Traversal') [CWE-22]CVE Reference: *Impact CVSS Severity (version 2.0):CVSS v2 Base Score: 7.5 (HIGH) (AV:N/AC:L/Au:N/C:P/I:P/A:P) (legend)Impact Subscore: 6.4Exploitability Subscore: 10.0Discover and Author: Wang Jing [CCRG, Nanyang Technological University(NTU), Singapore]*Recommendation Details:**(1) Vendor & Product Description:**Vendor:*724CMS Enterprise*Product & Vulnerable Versions:*724CMS3.014.014.595.01*Vendor URL & download:*724CMS can be bargained from here,http://724cms.com/*Product Introduction Overview:*"724CMS is a content management system (CMS) that has customers spread inCanada, Japan, Korean, the United States, European and many others. Itallows publishing, editing and modifying content, organizing, deleting aswell as maintenance from a central interface. Meanwhile, 724CMS providesprocedures to manage workflow in a collaborative environment.""A CMS helps you create and store content in a shared repository. It thenmanages the relationships between content items for you (e.g. keeping trackof where they fit into the site hierarchy). Finally, it ensures that eachcontent item is connected to the right style sheet when it comes to bepublished. Some CMSs also provide facilities to track the status of contentitems through editorial processes and workflows."*(2) Vulnerability Details:*724CMS web application has a security bug problem. It can be exploited byDirectory Traversal - Local File Include (LFI) attacks. A local fileinclusion (LFI) flaw is due to the script not properly sanitizing userinput, specifically path traversal style attacks (e.g. '../../') suppliedto the parameters. With a specially crafted request, a remote attacker caninclude arbitrary files from the targeted host or from a remote host . Thismay allow disclosing file contents or executing files like PHP scripts.Such attacks are limited due to the script only calling files already onthe target host.Several 724CMS products vulnerabilities have been found by some other bughunter researchers before. 724CMS has patched some of them. The MITRECorporation is a not-for-profit company that operates multiple federallyfunded research and development centers (FFRDCs), which provide innovative,practical solutions for some of our nation's most critical challenges indefense and intelligence, aviation, civil systems, homeland security, thejudiciary, healthcare, and cybersecurity. It has published suggestions,advisories, solutions details related to 724CMS vulnerabilities.*(2.1) *The first cipher programming flaw occurs at "/section.php" pagewith "&Module" parameter.*References:*http://www.tetraph.com/security/directory-traversal-vulnerability/724cms-5-01-directory-path-traversal-security-vulnerabilities/http://securityrelated.blogspot.com/2015/03/724cms-501-directory-path-traversal.htmlhttp://www.inzeed.com/kaleidoscope/computer-web-security/724cms-5-01-directory-path-traversal-security-vulnerabilities/http://diebiyi.com/articles/%E5%AE%89%E5%85%A8/724cms-5-01-directory-path-traversal-security-vulnerabilities/https://computertechhut.wordpress.com/2015/03/14/724cms-5-01-directory-path-traversal-security-vulnerabilities/http://marc.info/?a=139222176300014&r=1&w=4http://en.hackdig.com/wap/?id=17404--Wang Jing,Division of Mathematical Sciences (MAS),School of Physical and Mathematical Sciences (SPMS),Nanyang Technological University (NTU),Singapore.http://www.tetraph.com/wangjing/https://twitter.com/justqdjing724CMS 5.01 / 4.59 / 4.01 / 3.01 SQL Injection*724CMS 5.01 Multiple SQL Injection Security Vulnerabilities*Exploit Title: 724CMS Multiple SQL Injection Security VulnerabilitiesVendor: 724CMSProduct: 724CMSVulnerable Versions: 3.01 4.01 4.59 5.01Tested Version: 5.01Advisory Publication: March 14, 2015Latest Update: March 14, 2015Vulnerability Type: Improper Neutralization of Special Elements used in anSQL Command ('SQL Injection') [CWE-89]CVE Reference: *Impact CVSS Severity (version 2.0):CVSS v2 Base Score: 7.5 (HIGH) (AV:N/AC:L/Au:N/C:P/I:P/A:P) (legend)Impact Subscore: 6.4Exploitability Subscore: 10.0Credit: Wang Jing [Mathematics, Nanyang Technological University (NTU),Singapore]*Recommendation Details:**(1) Vendor & Product Description:**Vendor:*724CMS Enterprise*Product & Vulnerable Versions:*724CMS3.014.014.595.01*Vendor URL & download:*724CMS can be gain from here,http://724cms.com/*Product Introduction Overview:*"724CMS is a content management system (CMS) that has customers spread inCanada, Japan, Korean, the United States, European and many others. Itallows publishing, editing and modifying content, organizing, deleting aswell as maintenance from a central interface. Meanwhile, 724CMS providesprocedures to manage workflow in a collaborative environment.""A CMS helps you create and store content in a shared repository. It thenmanages the relationships between content items for you (e.g. keeping trackof where they fit into the site hierarchy). Finally, it ensures that eachcontent item is connected to the right style sheet when it comes to bepublished. Some CMSs also provide facilities to track the status of contentitems through editorial processes and workflows."*(2) Vulnerability Details:*724CMS web application has a security bug problem. It can be exploited bySQL Injection attacks. This may allow an attacker to inject or manipulateSQL queries in the back-end database, allowing for the manipulation ordisclosure of arbitrary data.Several 724CMS products vulnerabilities have been found by some other bughunter researchers before. 724CMS has patched some of them. The MITRECorporation is a not-for-profit company that operates multiple federallyfunded research and development centers (FFRDCs), which provide innovative,practical solutions for some of our nation's most critical challenges indefense and intelligence, aviation, civil systems, homeland security, thejudiciary, healthcare, and cybersecurity. It has phase, votes, comments andproposed details related to 724CMS vulnerabilities.*(2.1)* The first cipher programming flaw occurs at "/index.php" page with"&Lang", "&ID" parameters.*(2.2) *The second cipher programming flaw occurs at "/section.php" pagewith "&Lang", "&ID" parameters.*References:*http://www.tetraph.com/security/sql-injection-vulnerability/724cms-5-01-multiple-sql-injection-security-vulnerabilities/http://securityrelated.blogspot.com/2015/03/724cms-501-multiple-sql-injection.htmlhttp://www.inzeed.com/kaleidoscope/computer-web-security/724cms-5-01-multiple-sql-injection-security-vulnerabilities/http://diebiyi.com/articles/%E5%AE%89%E5%85%A8/724cms-5-01-multiple-sql-injection-security-vulnerabilities/https://computertechhut.wordpress.com/2015/03/14/724cms-5-01-multiple-sql-injection-security-vulnerabilities/https://www.mail-archive.com/fulldisclosure%40seclists.org/msg01766.htmlhttp://marc.info/?a=139222176300014&r=1&w=4http://en.1337day.com/exploit/23308--Wang Jing,Division of Mathematical Sciences (MAS),School of Physical and Mathematical Sciences (SPMS),Nanyang Technological University (NTU),Singapore.http://www.tetraph.com/wangjing/https://twitter.com/tetraphibious724CMS 5.01 / 4.59 / 4.01 / 3.01 Cross Site Scripting*724CMS 5.01 Multiple XSS (Cross-site Scripting) Security Vulnerabilities*Exploit Title: 724CMS Multiple XSS (Cross-site Scripting) SecurityVulnerabilitiesVendor: 724CMSProduct: 724CMSVulnerable Versions: 3.01 4.01 4.59 5.01Tested Version: 5.01Advisory Publication: March 15, 2015Latest Update: March 15, 2015Vulnerability Type: Cross-Site Scripting [CWE-79]CVE Reference: *Impact CVSS Severity (version 2.0):CVSS v2 Base Score: 4.3 (MEDIUM) (AV:N/AC:M/Au:N/C:N/I:P/A:N) (legend)Impact Subscore: 2.9Exploitability Subscore: 8.6Credit: Wang Jing [Mathematics, Nanyang Technological University (NTU),Singapore]*Recommendation Details:**(1) Vendor & Product Description:**Vendor:*724CMS Enterprise*Product & Vulnerable Versions:*724CMS3.014.014.595.01*Vendor URL & download:*724CMS can be purchased from here,http://724cms.com/*Product Introduction Overview:*"724CMS is a content management system (CMS) that has customers spread inCanada, Japan, Korean, the United States, European and many others. Itallows publishing, editing and modifying content, organizing, deleting aswell as maintenance from a central interface. Meanwhile, 724CMS providesprocedures to manage workflow in a collaborative environment.""A CMS helps you create and store content in a shared repository. It thenmanages the relationships between content items for you (e.g. keeping trackof where they fit into the site hierarchy). Finally, it ensures that eachcontent item is connected to the right style sheet when it comes to bepublished. Some CMSs also provide facilities to track the status of contentitems through editorial processes and workflows."*(2) Vulnerability Details:*724CMS web application has a security bug problem. It can be exploited byXSS attacks. This may allow a remote attacker to create a specially craftedrequest that would execute arbitrary script code in a user's browsersession within the trust relationship between their browser and the server.Several 724CMS products vulnerabilities have been found by some other bughunter researchers before. 724CMS has patched some of them. The MITRECorporation is a not-for-profit company that operates multiple federallyfunded research and development centers (FFRDCs), which provide innovative,practical solutions for some of our nation's most critical challenges indefense and intelligence, aviation, civil systems, homeland security, thejudiciary, healthcare, and cybersecurity. It has published suggestions,advisories, solutions details related to 724CMS vulnerabilities.*(2.1)* The first code programming flaw occurs at "/index.php" page with"&Lang" parameter.*(2.2) *The second code programming occurs at "/section.php" page with"&Lang", "&ID", "&Nav" parameters.*References:*http://www.tetraph.com/security/xss-vulnerability/724cms-5-01-multiple-xss-cross-site-scripting-security-vulnerabilities/http://securityrelated.blogspot.com/2015/03/724cms-501-multiple-xss-cross-site.htmlhttp://www.inzeed.com/kaleidoscope/computer-web-security/724cms-5-01-multiple-xss-cross-site-scripting-security-vulnerabilities/http://diebiyi.com/articles/%E5%AE%89%E5%85%A8/724cms-5-01-multiple-xss-cross-site-scripting-security-vulnerabilities/https://computertechhut.wordpress.com/2015/03/14/724cms-5-01-multiple-xss-cross-site-scripting-security-vulnerabilities/http://marc.info/?l=full-disclosure&m=142576259903051&w=4https://www.mail-archive.com/fulldisclosure%40seclists.org/msg01737.htmlhttp://en.hackdig.com/?16117.htm--Wang Jing,Division of Mathematical Sciences (MAS),School of Physical and Mathematical Sciences (SPMS),Nanyang Technological University (NTU),Singapore.http://www.tetraph.com/wangjing/https://twitter.com/tetraphibious Quote