e107 Input Validation Hole in News Item Title Field Permits Cross-Site Scripting Attacks
SecurityTracker Alert ID: 1024351|
SecurityTracker URL: http://securitytracker.com/id/1024351
(Links to External Site)
Updated: Mar 17 2011|
Original Entry Date: Aug 23 2010
Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information|
Fix Available: Yes Vendor Confirmed: Yes Exploit Included: Yes |
Version(s): 0.7.22; possibly other versions|
A vulnerability was reported in e107. A remote user can conduct cross-site scripting attacks. A remote user can conduct cross-site request forgery attacks.|
The software does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the e107 software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.
Specially crafted news item titles are affected when displayed for review (e107_admin/newspost.php?sn) by the target administrator.
A remote user can also determine the appropriate token to be used in the user add form (e107_admin/users.php?create) to conduct cross-site request forgery attacks.
Justin Klein Keane reported this vulnerability.
A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the e107 website system software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.|
A remote user can conduct cross-site request forgery attacks.
The vendor has issued a fix (0.7.23).|
Vendor URL: www.e107.org/ (Links to External Site)
Input validation error|
|Underlying OS: Linux (Any), UNIX (Any), Windows (Any)|
Source Message Contents
Subject: [Full-disclosure] e107 CMS Multiple Vulnerabilities|
-----BEGIN PGP SIGNED MESSAGE-----
Details of this report may also be found at
Description of Vulnerability:
e107 (http://e107.org) is a PHP/MySQL based content management system.
e107 allows anonymous users to submit news items for display on the
front page. These items enter a queue for review by admins and are
subsequently approved or rejected.
e107 suffers from cross site scripting (XSS) vulnerabilities because it
fails to properly sanitize user supplied input when rendering submitted
news item titles for administrative review. Malicious users can submit
news at the default submitnews.php URL. e107 sanitizes single quotes to
prevent against SQL injection but does not alter double quotes or HTML
after their title and this script would execute silently when an
administrator viewed the approval queue at e107_admin/newspost.php?sn.
e107 suffers from a cross site request forgery (XSRF) vulnerability
because it fails to use a difficult to discover random token in the user
add form located at e107_admin/users.php?create. The token is carried
in a hidden form field 'ac' and is derived from the MD5 hash of the
administrative user accounts create date. When the administrative
account is created the unix timestamp is stored in the MySQL database in
the e107_user.user_pwchange column. Because logged in users can view
the 'Joined' state of the admin user at /user.php?id.1 it is easy to
derive the unix timestamp for the creation date of the account.
e107 0.7.22 was tested and shown to be vulnerable
Unauthenticated users can exploit these vulnerabilities to attack other
users, potentially compromising the e107 service or host.
Upgrade to the latest version of e107 in order to mitigate these
Justin Klein Keane
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/
-----END PGP SIGNATURE-----
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/