TUCoPS :: Web :: CMS / Portals :: b1a-1256.htm

Plume CMS - change Admin Password via Cross-site Request Forgery
Plume CMS - change Admin Password via Cross-site Request Forgery
Plume CMS - change Admin Password via Cross-site Request Forgery



[MajorSecurity SA-070]Plume CMS - change Admin Password via Cross-site Request Forgery=0D
=0D
Details=0D
========0D
Product: Plume CMS=0D
Security-Risk: high=0D
Remote-Exploit: yes=0D
Vendor-URL: http://www.plume-cms.net/=0D 
Advisory-Status: published=0D
=0D
Credits=0D
=============0D
Discovered by: David Vieira-Kurz=0D
http://www.majorsecurity.info/penetrationstest.php=0D 
=0D
Affected Products:=0D
----------------------------=0D
Plume CMS 1.2.4=0D
Prior versions may also be vulnerable=0D
=0D
Introduction=0D
=============0D
"Plume CMS is web based content management system." =0D
=0D
More Details=0D
=============0D
We at MajorSecurity have discovered a vulnerability in Plume CMS, which can be exploited by malicious people to conduct cross-site request forgery attacks.=0D
The application allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to change the administrator's password by tricking a logged in administrator into visiting a malicious web site.=0D
=0D
Solution=0D
=================0D
The web application should implement some validity checks to verify the requests before performing certain actions via HTTP requests.=0D
=0D
Workaround=0D
=================0D
Do not browse untrusted sites or follow untrusted links while being logged-in to the application.=0D
=0D
MajorSecurity=0D
=================0D
MajorSecurity is a German penetrationtesting and security research company which focuses=0D
on web application security. We offer professional penetrationstest, security audits,=0D
source code reviews. 

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH