what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

CMS Made Simple 1.7.1 Cross Site Scripting / Cross Site Request Forgery

CMS Made Simple 1.7.1 Cross Site Scripting / Cross Site Request Forgery
Posted Jun 2, 2010
Site bkis.com

CMS Made Simple versions 1.7.1 and below suffer from cross site request forgery and cross site scripting vulnerabilities.

tags | advisory, vulnerability, xss, csrf
SHA-256 | dfd0aa4f4ad263b0b79385a5b44544f3ef742e141f0336e65f0e06753682a8df

CMS Made Simple 1.7.1 Cross Site Scripting / Cross Site Request Forgery

Change Mirror Download
[Bkis-02-2010] Multiple Vulnerabilities in CMS Made Simple

1. General information

CMS Made Simple is a free content management system (CMS) written in PHP,
available at www.cmsmadesimple.org. In March, 2010, Bkis Security discovered
some XSS and CSRF vulnerabilities in CMS Made Simple 1.7.1. Taking advantage
of these vulnerabilities, hacker is able to insert pieces of code into the
path's link to execute in user's browser, causing the loss of cookies and
session. Hacker is also able to trick users into manipulating some of the
system's functions without users' knowledge. Bkis has informed the CMS Made
Simple's development team of these vulnerabilities.

Details:
http://security.bkis.com/multiple-vulnerabilities-in-cms-made-simple/
SVRT Advisory: Bkis-02-2010
Initial vendor notification: 05/12/2010
Release Date: 06/21/2010
Update Date: 06/21/2010
Discovered by: Truong Thao Nguyen, Do Hoang Bach, Cao Xuan Sang
Attack Type: XSS, CSRF
Security Rating: High
Impact: Code Execution
Affected Software: CMS Made Simple (version <= 1.7.1)

2. Technical details

The XSS vulnerability is found in the following modules:
- Add Pages
- Add Global Content
- Edit Global Content
- Add Article
- Add Category
- Add Field Definition
- Add Shortcut

Since the input variants of this function are not carefully checked and
filtered, hacker is able to insert pieces of code into the path's link. When
users sign in and click this link, the malicious code (JavaScript) will be
executed, leading to the loss of cookies, session, etc.

The CSRF vulnerability is found in the following module:
- Changes group permission

Since a task is performed without seeking users' prior permission first,
users can be tricked into performing a task without awareness. Thus, hacker
is able to perform malicious actions via legitimate users.

In addition, the vulnerabilities are all found in content management section
of CMSMadeSimple. Thus, the victims of such vulnerabilities are the system's
administrators, editors and designers.

3. Solution

CMSMadeSimple's development team has not issued the patches for these
vulnerabilities yet. Thus, Bkis strongly recommends individuals and
organizations that use this software to take caution when receiving links,
and at the same time keep track of the information about the latest software
version to update.

----------------------------------------------------------------
Bui Quang Minh
Manager - Vuln Team - Bkis Security - Bkis

Office : Hitech building - 1A Dai Co Viet, Hanoi
Email : minhbq@bkav.com.vn
Website : www.bkav.com.vn; www.bkav.com
Blog : security.bkis.com
----------------------------------------------------------------
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    0 Files
  • 9
    Nov 9th
    0 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close