TUCoPS :: Web :: CMS / Portals :: b1a-1170.htm

CMS Made Simple - Bkis Multiple Vulnerabilities
Multiple Vulnerabilities in CMS Made Simple - Bkis
Multiple Vulnerabilities in CMS Made Simple - Bkis

[Bkis-02-2010] Multiple Vulnerabilities in CMS Made Simple

1. General information

CMS Made Simple is a free content management system (CMS) written in PHP, 
available at www.cmsmadesimple.org. In March, 2010, Bkis Security discovered 
some XSS and CSRF vulnerabilities in CMS Made Simple 1.7.1. Taking advantage 
of these vulnerabilities, hacker is able to insert pieces of code into the 
path's link to execute in user's browser, causing the loss of cookies and 
session. Hacker is also able to trick users into manipulating some of the 
system's functions without users' knowledge. Bkis has informed the CMS Made 
Simple's development team of these vulnerabilities.

SVRT Advisory: Bkis-02-2010
Initial vendor notification: 05/12/2010
Release Date: 06/21/2010
Update Date: 06/21/2010
Discovered by: Truong Thao Nguyen, Do Hoang Bach, Cao Xuan Sang
Attack Type: XSS, CSRF
Security Rating: High
Impact: Code Execution
Affected Software: CMS Made Simple (version <= 1.7.1)

2. Technical details

The XSS vulnerability is found in the following modules:
- Add Pages
- Add Global Content
- Edit Global Content
- Add Article
- Add Category
- Add Field Definition
- Add Shortcut

Since the input variants of this function are not carefully checked and 
filtered, hacker is able to insert pieces of code into the path's link. When 
users sign in and click this link, the malicious code (JavaScript) will be 
executed, leading to the loss of cookies, session, etc.

The CSRF vulnerability is found in the following module:
- Changes group permission

Since a task is performed without seeking users' prior permission first, 
users can be tricked into performing a task without awareness. Thus, hacker 
is able to perform malicious actions via legitimate users.

In addition, the vulnerabilities are all found in content management section 
of CMSMadeSimple. Thus, the victims of such vulnerabilities are the system's 
administrators, editors and designers.

3. Solution

CMSMadeSimple's development team has not issued the patches for these 
vulnerabilities yet. Thus, Bkis strongly recommends individuals and 
organizations that use this software to take caution when receiving links, 
and at the same time keep track of the information about the latest software 
version to update.

Bui Quang Minh
Manager - Vuln Team - Bkis Security - Bkis

Office : Hitech building - 1A Dai Co Viet, Hanoi
Email : minhbq@bkav.com.vn 
Website : www.bkav.com.vn; www.bkav.com 
Blog : security.bkis.com

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986- AOH