Advertisement






HumHub 1.0.1 Cross Site Scripting

CVE Category Price Severity
CVE-2021-27425 CWE-79 $500 High
Author Risk Exploitation Type Date
Unknown High Remote 2017-03-20
Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2017030178

Below is a copy:

HumHub 1.0.1 Cross Site ScriptingSecurity Advisory - Curesec Research Team

1. Introduction

Affected Product: HumHub 1.0.1 and earlier
Fixed in:         1.1.1
Fixed Version     https://www.humhub.org/en/download/default/form?version=1.1.1
Link:             &type=zip
Vendor Website:   https://www.humhub.org/
Vulnerability     XSS
Type:
Remote            Yes
Exploitable:
Reported to       01/10/2016
vendor:
Disclosed to      03/17/2017
public:
Release mode:     Coordinated Release
CVE:              n/a
Credits           Tim Coen of Curesec GmbH

2. Overview

HumHub is a social media platform written in PHP. In version 1.0.1 and earlier,
it is vulnerable to a reflected XSS attack if debugging is enabled, as well as
a self-XSS attack. This allows an attacker to steal cookies, inject JavaScript
keyloggers, or bypass CSRF protection.

3. Details

XSS 1: Reflected XSS

CVSS: Medium 4.3 AV:N/AC:M/Au:N/C:N/I:P/A:N

Description: When the debug mode is enabled, which it is by default, the
UserSearch parameter is vulnerable to reflected XSS. Additionally, the
resulting error page discloses all cookies - even httpOnly cookies -, and the
contents of the $_SERVER array.

Proof of Concept:

http://localhost/humhub-0.20.0/index.php?UserSearch[last_login]=<script>alert
(1)</script>&r=admin%2Fuser

XSS 2: DOM-based Self-XSS

CVSS: Low 2.6 AV:N/AC:H/Au:N/C:N/I:P/A:N

There is a reflected DOM-based self-XSS vulnerability in HumHub. It may be
possible to exploit this issue via ClickJacking in some browsers.

Proof of Concept:

Visit the profile of a user: http://localhost/humhub-0.20.0/index.php?r=
space%2Fspace&sguid=d2f06d0a-47e1-4549-b469-c8a1df48faca In the "What's on your
mind?"-text box enter: '"><img src=no onerror=alert(5)>

4. Solution

To mitigate this issue please upgrade at least to version 1.1.1:

https://www.humhub.org/en/download/default/form?version=1.1.1&type=zip

Please note that a newer version might already be available.

5. Report Timeline

01/10/2016 Informed Vendor about Issue
01/12/2016 Vendor confirms issue
02/10/2016 Vendor requests more time
08/16/2016 Vendor releases partial fix
09/26/2016 Vendor releases fix
03/27/2017 Disclosed to public


Blog Reference:
https://www.curesec.com/blog/article/blog/HumHub-101-XSS-195.html
 
--
blog: https://www.curesec.com/blog
Atom Feed: https://www.curesec.com/blog/feed.xml
RSS Feed: https://www.curesec.com/blog/rss.xml
tweet: https://twitter.com/curesec

Curesec GmbH
Curesec Research Team
Josef-Orlopp-StraAe 54
10365 Berlin, Germany




Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum