header-logo
Suggest Exploit
vendor:
ClipperCMS
by:
Ameer Pornillos
8.8
CVSS
HIGH
CSRF
352
CWE
Product Name: ClipperCMS
Affected Version From: 1.3.3
Affected Version To: 1.3.3
Patch Exists: NO
Related CWE: CVE-2018-19135
CPE: a:clippercms:clippercms:1.3.3
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Windows 10 x64 (XAMPP, Firefox)
2018

ClipperCMS 1.3.3 File Upload CSRF Vulnerability

ClipperCMS 1.3.3 does not have CSRF protection on its kcfinder file upload which is being used by default. This can be used by an attacker to perform actions for an admin (or any user with file upload capability). With this vulnerability, it can automatically upload file/s (by default it allows aac,au,avi,css,cache,doc,docx,gz,gzip,htm,html,js,mp3,mp4,mpeg,mpg,ods,odp,odt,pdf,ppt,pptx,rar,tar,tgz,txt,wav,wmv,xls,xlsx,xml,z,zip as file types). Note that web shell that can be used for remote code execution can be achieved depending on the file types being accepted. Uploaded file can be accessed publicly on the "/assets/files" directory (e.g. uploaded a malicious html file with filename: poc.html file => http://<clipperwebsite>/clipper/assets/files/poc.html). This can lead for the website to be host unintended file/s.

Mitigation:

Implement CSRF protection on the kcfinder file upload.
Source

Exploit-DB raw data: