Document Title: =============== gpEasy v4.3.x CMS - Multiple Web Vulnerabilities References (Source): ==================== http://www.vulnerability-lab.com/get_content.php?id=1189 Release Date: ============= 2014-02-06 Vulnerability Laboratory ID (VL-ID): ==================================== 1189 Common Vulnerability Scoring System: ==================================== 6.1 Product & Service Introduction: =============================== gpEasy 4.3 is a complete content management system that lets users create rich and flexible Web sites with a simple and easy-to-use interface. The embedded design of the admin interface allows users to instantly see changes in a single browser window. gpEasy has many qualities, but if we had to pick three adjectives to describe our CMS, it would have to be fast, easy and free. These three small words represent big ideas for us and embody the principles that drive gpEasy development. (Copy of the Vendor Homepage: http://www.gpeasy.com/Fast_Easy_and_Free ) Abstract Advisory Information: ============================== The Vulnerability Laboratory Research Team discovered multiple web vulnerabilities in the official gpEasy v4.3 content management system. Vulnerability Disclosure Timeline: ================================== 2013-02-06: Public Disclosure (Vulnerability Laboratory) Discovery Status: ================= Published Affected Product(s): ==================== gpEasy Product: gpEasy Content Management System (Web Application) 4.3 Exploitation Technique: ======================= Remote Severity Level: =============== High Technical Details & Description: ================================ 1.1 A file include and arbitrary file upload web vulnerability has been discovered in the official gpEasy v4.3 content management system. The local file include web vulnerability allows remote attackers to unauthorized include local file/path requests or system specific path commands to compromise the web-application. The arbitrary file upload issue allows remote attackers to upload files with multiple extensions to bypass the web-server or system validation. The vulnerability is located in the `file- and folder` name values of the `upload files` module. Attackers can tamper the POST method request to upload own malicious script codes or web shells. The validation does also not support filter mechanism for multiple file extension which can result in a prepared combined attack to include a file and upload/execute arbitrary codes. The security risk of the local and remote vulnerability is estimated as high with a cvss (common vulnerability scoring system) count of 6.1(-). Exploitation of the local file include and arbitrary file upload web vulnerability requires no user interaction but a privileged web-application user account. Successful exploitation of the local web vulnerability results in application or dbms compromise by combined lfi/afu web attacks. Request Method(s): [+] POST Vulnerable Module(s): [+] Home > Administration > Uploaded Files Vulnerable Parameter(s): [+] file- and folder name Vulnerable Module(s): [+] Upload File Manager 1.2 Multiple client-side cross site scripting web vulnerabilities has been discovered in the official gpEasy v4.3 content management system. A non-persistent cross site vulnerability allows remote attackers to manipulate client-side browser requests through the affected web-application. The vulnerability is located in the `mount network volume` function of the `content > upload files` module. The vulnerable input field values are `host`,`port`,`path`,`user` and `pass`. Remote attackers can manipulate the GET method request of the `mount network volume` function to provoke a wrong encoded exception which executes the injected script code. The code executes in the invalid error message exception of the mount network volume function. The security risk of the remote xss web vulnerability is estimated as medium with a cvss (common vulnerability scoring system) count of 2.9(+). Request Method(s): [+] GET Vulnerable Module(s): [+] Home > Administration > Uploaded Files > Mount Network Volume Vulnerable Parameter(s): [+] host [+] port [+] path [+] user [+] pass Affected Module(s): [+] Error invalid Content Exception Proof of Concept (PoC): ======================= 1.1 The file include and arbitrary file upload web vulnerability can be exploited by local attacker with privileged user account and without user interaction. For security demonstration or to reproduce the vulnerability follow the provided steps and information below. PoC: