vendor:
Syncrify Server
by:
Marlow Tannhauser
7.5
CVSS
HIGH
CSRF/Stored XSS
352
CWE
Product Name: Syncrify Server
Affected Version From: 3.6 Build 833
Affected Version To: 3.6 Build 833
Patch Exists: Yes
Related CWE: 2015-3140
CPE: a:synametrics:syncrify_server:3.6
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: None
2015
Multiple vulnerabilities in Syncrify Server 3.6 Build 833 (CSRF/Stored XSS)
Syncrify 3.6 Build 833 is vulnerable to CSRF attacks, which can also be combined with stored XSS attacks (authenticated administrators only). The JSESSIONID created when a user logs on to the system is persistent and does not change across requests. The following PoC uses the CSRF vulnerability to change the SMTP settings in the application, and combines it with two of the stored XSS vulnerabilities. The following PoC uses the CSRF vulnerability to change the administrator password.
Mitigation:
The vendor has released a patch to address the vulnerabilities.