______ ______ _____ ___ _____ _____ _____ | ___ \ | ___ \ | _ | |_ | | ___| / __ \ |_ _| | |_/ / | |_/ / | | | | | | | |__ | / \/ | | | __/ | / | | | | | | | __| | | | | | | | |\ \ \ \_/ / /\__/ / | |___ | \__/\ | | \_| \_| \_| \___/ \____/ \____/ \____/ \_/ _____ _ _ _____ _____ _____ _ _ ______ _____ _____ __ __ |_ _| | \ | | / ___| | ___| / __ \ | | | | | ___ \ |_ _| |_ _| \ \ / / | | | \| | \ `--. | |__ | / \/ | | | | | |_/ / | | | | \ V / | | | . ` | `--. \ | __| | | | | | | | / | | | | \ / _| |_ | |\ | /\__/ / | |___ | \__/\ | |_| | | |\ \ _| |_ | | | | \___/ \_| \_/ \____/ \____/ \____/ \___/ \_| \_| \___/ \_/ \_/ [+]-------------------------------------------------------------[+] | Vulnerable Software: Concrete5 CMS | | Vendor: http://www.concrete5.org/ | | Vulnerability Type: CSRF to DoS (disables installation) | | Date Released: 23/04/2017 | | Released by: CDL (@sxcurity) | [+]-------------------------------------------------------------[+] [+] Description: Concrete5's Thumbnail Editor in the File Manager is vulnerable to CSRF, which allows remote attackers to disable the entire installation of concrete5, by merely tricking an admin view a malicious page. This results in a site-wide denial of service meaning neither the admin OR any of the website users can acccess the site. ------------------------------------------------------------------------------------------------------------- [+] Summary: The Thumbnail Editor function in the File Manager of Concrete5 allows an admin to change a thumbnail of a picture. However, this function does not have any CSRF tokens / any other protection from CSRF, thus allowing an attacker to make an admin upload a picture. If the picture is invalid, the image processor will throw an error immediately and when the admin visits the File Manager, a side-wide error will trigger, making the site unusable! (Example: http://archive.is/LZa5b) The vulnerable parameter is 'imgData' POST/GET param in 'http://[HOST]/index.php/tools/required/files/importers/imageeditor' So, in order to trigger this site-wide error, an attacker would first have to make the admin do 2 things. 1.) Make the admin upload an invalid image 2.) Make the admin visit the File Manager I came up with a proof of concept to do just that ;) [+] Proof of Concept: -------------------------------------------------------------------------------------------------------------