ADVISORY INFORMATION

  • Product: Aoop CMS
  • Vendor URL: https://www.annonyme.de
  • CWE: Cross-site Scripting [CWE-79], SQL-Injection [CWE-89]
  • Date found: 2012-04-07
  • Date published: 2012-08-24
  • CVSS Score: 7,5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) (highest)
  • CVE: -

CREDITS

The vulnerabilities were discovered and researched by Julien Ahrens from Inshell Security.

VERSIONS AFFECTED

Aoop CMS v0.3.6, older versions may be affected too.

INTRODUCTION

N/A

VULNERABILITY DETAILS

Aoop CMS v0.3.6 is affected by multiple SQL-Injection and Cross-Site Scripting vulnerabilites.

SQL-Injection Vulnerabilities

Pre-Auth:

/index.php?print=download&page=Photos&sub=loadAndShowPhoto&picId=[SQLi]

Post-Auth:

/index.php?page=users&sub=readMessage&msgId=[SQLi]
/index.php?page=users&sub=newMessage&messageId=[SQLi]
/index.php?page=users&sub=deleteMessage&messageId=[SQLi]
/index.php?page=EProjects&sub=editRFC&rfcId=[SQLi]&projectId=18

Due to improper input - validation of these GET parameters, an attacker could inject own arbitrary SQL statements without or with required authentication. Successful exploitation of these vulnerabilities could result in a complete database / web-application compromise or data theft.

Cross-Site Scripting Vulnerabilities

Non-Persistent (GET):

/index.php?page=Photos&sub=search&pattern="><script>alert(String.fromCharCode(88,83,83))</script>

Non-Persistent (POST):

/index.php?page=Photos&sub=search (Field:
"Pattern",payload="><script>alert(1)</script>)

Due to improper input - validation of these GET/POST parameters, an attacker could temporarily inject arbitrary code using required user interaction into the context of the website/current browser session. Successful exploitation of these vulnerabilities allows for example session hijacking or client side context manipulation.

Persistent:

/index.php?page=users&sub=extendUserProfile (Field:
"profileItemName", "profileItemValue">
/index.php?page=EProjects&sub=viewProject&projectId=18
(Field: "name","official_link")
/index.php?page=Photos&sub=uploadPic (Field: "Title")

Due to improper input - validation of these input fields, an attacker could permanently inject arbitrary code using an own registered user-account into the context of the website. Successful exploitation of these vulnerabilities allows for example session hijacking or server side context manipulation.

PROOF OF CONCEPT

SOLUTION

Update to v0.4 RC3

REPORT TIMELINE

  • 2012-04-07: Initial notification sent to vendor
  • 2012-04-08: Vendor Response / Feedback
  • 2012-07-29: Vendor releases v0.4 RC3 which fixes the vulnerabilities
  • 2012-08-24: Coordinated public release of advisory

REFERENCES

None