Document Title: =============== Elefant CMS v1.3.9 - Persistent Name Update Vulnerability References (Source): ==================== http://www.vulnerability-lab.com/get_content.php?id=1365 Release Date: ============= 2014-12-03 Vulnerability Laboratory ID (VL-ID): ==================================== 1365 Common Vulnerability Scoring System: ==================================== 3.9 Product & Service Introduction: =============================== Elefant provides a modern, minimalist user interface that eliminates clutter and confusion, with a site editor that gets out of your way and is a pleasure to use. You`ll notice right away the attention to detail throughout the software. Elefant takes the best WYSIWYG editor in the world, and makes it better through deep integration with your content. With Elefant`s dynamic objects plugin, you can embed dozens of types of dynamic content anywhere on your site, things like videos, event calendars, contact forms, social media integration, photo galleries and slideshows, member login, payment buttons, you name it. (Copy of the Vendor Homepage: https://elefantcms.com/ ) Abstract Advisory Information: ============================== The Vulnerability Laboratory Research Team discovered an application-side input validation web vulnerability in the official ElefantCMS v1.3.9 web-application. Vulnerability Disclosure Timeline: ================================== 2014-12-03: Public Disclosure (Vulnerability Laboratory) Discovery Status: ================= Published Affected Product(s): ==================== Github Product: ElefantCMS - Web Application 1.3.9 Exploitation Technique: ======================= Remote Severity Level: =============== Medium Technical Details & Description: ================================ A persistent input validation web vulnerability has been discovered in the official ElefantCMS v1.3.9 web-application. The vulnerability allows remote attackers to inject malicious script codes on the application-side of the vulnerable service. The vulnerability is located in the user `name` value of the profile module. Remote attackers are able to inject own persistent script code in the user profile module. The POST method inject runs through the /user/update module and the execution of the payload occurs in the ./user profile page. The attack vector of the vulnerability is located on the application-side and the request method to inject malicious codes is POST. The security risk of the persistent vulnerability is estimated as medium with a cvss (common vulnerability scoring system) count of 3.9. Exploitation of the persistent security vulnerability requires a low privileged web-application user account and low user interaction. Successful exploitation of the vulnerabilities result in persistent phishing attacks, persistent session hijacking attacks, persistent external redirect to malicious sources and application-side manipulation of affected or connected module context. Request Method(s): [+] POST Vulnerable Module(s): [+] http://elefantcms.127.0.0.1:8080/user/update Vulnerable Parameter(s): [+] name Affected Module(s): [+] http://elefantcms.127.0.0.1:8080/user Proof of Concept (PoC): ======================= The persistent input validation web vulnerability can be exploited by remote attackers with low user interaction (click). For security demonstration or to reproduce the security vulnerability follow the provided information and steps below to continue. Manual steps to reproduce the vulnerability ... 1. Install the elefeantcms application and open the frontend 2. Register an user account and save the random settings 3. Do to the ./user page to update the users profile 4. Inject own script code as payload to the vulnerable name input field. Save the settings 5. The execution occurs in the profile page of the user that is visible to the admin or other users 6. Successful reproduce of the vulnerability! PoC: ./user
Demo Notice: This site resets itself every hour on the hour.
Download Elefant
|
Elefant web hosting
|
Elefant VPS hosting