Wolf CMS is a content management system and is Free Software publishedunder the GNU GeneralPublic License v3. Wolf CMS is written in the PHP programming language.Wolf CMS is a fork of Frog CMS.The project was a finalistin the 2010 Packt Publishing s Open Source awardsfor the Most PromisingOpen Source Project category. As of the 28th of December 2010, the Wolf CMScode repository was movedfrom Google Code to Github.( Copy of the Vendor Homepage: http://en.wikipedia.org/wiki/Wolf_CMS )Abstract:=========Vulnerability Laboratory Research Team discovered multiple WebVulnerabilities on the Wolf Content Management System v0.7.5Report-Timeline:================2012-02-11: Vendor Notification2012-02-27: Public or Non-Public DisclosureStatus:========PublishedAffected Products:==================BlueWin CHProduct: Wolf CMS v0.7.5Exploitation-Technique:=======================RemoteSeverity:=========HighDetails:========1.1A SQL Injection vulnerability is detected on the Wolfs Content ManagementSystem v0.7.5. Thevulnerability allows an remote attacker to execute own sql commands on theaffected applicationdbms. Successful exploitation can result in dbms, web-server or applicationcompromise.Vulnerable Module(s):[+] /plugins/comment/[Index]Picture(s):../1.png1.2Multiple persistent vulnerabilities are detected on the Wolfs ContentManagement System v0.7.5.The bug allows an remote attacker or local low privileged user account toinject persistent maliciousscript code on application side. Successful exploitation can result inpersistent context manipulationon requests, session hijacking & account steal via application sidephishing.Vulnerable Module(s):[+] /plugins/comment/Picture(s):../2.pngProof of Concept:=================The vulnerabilities can be exploited by remote attackers & local lowprivileged user accounts with- andwithout required user inter action. For demonstration or reproduce ...1.1Path: /wolfcms/wolf/plugins/comment/File: index.phpReview:271: $ip = isset($_SERVER['HTTP_X_FORWARDED_FOR']) ?$_SERVER['HTTP_X_FORWARDED_FOR']:($_SERVER['REMOTE_ADDR']);1.2Path: /wolfcms/wolf/plugins/comment/File: index.phpReview:/wolfcms/wolf/plugins/comment/index.php272: echo '<input type="hidden" value="'.$ip.'" name="comment[author_ip]"/>';Risk:=====1.1The security risk of the blind sql injection vulnerabilities are estimatedas high(+).1.2The security risk of the persistant xss vulnerabilities are estimated asmedium(+).Credits:========Vulnerability Research Laboratory - Ucha Gobejishvili (longrifle0x)Disclaimer:===========The information provided in this advisory is provided as it is without anywarranty. Vulnerability-Lab disclaims all warranties,either expressed or implied, including the warranties of merchantabilityand capability for a particular purpose. Vulnerability-Lab or its suppliers are not liable in any case of damage, includingdirect, indirect, incidental, consequential loss of businessprofits or special damages, even if Vulnerability-Lab or its suppliers havebeen advised of the possibility of such damages. Somestates do not allow the exclusion or limitation of liability forconsequential or incidental damages so the foregoing limitationmay not apply. Any modified copy or reproduction, including partiallyusages, of this file requires authorization from Vulnerability-Lab. Permission to electronically redistribute this alert in its unmodifiedform is granted. All other rights, including the use ofother media, are reserved by Vulnerability-Lab or its suppliers.Copyright � 2012|Vulnerability-Lab
0 comments:
Post a Comment