Сross-Site Request Forgery (CSRF) in xEpan
Advisory ID: | HTB23240 |
Product: | xEpan |
Vendor: | Xavoc Technocrats Pvt. Ltd. |
Vulnerable Versions: | 1.0.1 and probably prior |
Tested Version: | 1.0.1 |
Advisory Publication: | October 22, 2014 [without technical details] |
Vendor Notification: | October 22, 2014 |
Public Disclosure: | November 26, 2014 |
Latest Update: | November 26, 2014 |
Vulnerability Type: | Cross-Site Request Forgery [CWE-352] |
CVE Reference: | CVE-2014-8429 |
Risk Level: | Medium |
CVSSv2 Base Score: | 5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P) |
Solution Status: | Not Fixed |
Discovered and Provided: | High-Tech Bridge Security Research Lab |
Advisory Details: | |
High-Tech Bridge Security Research Lab discovered vulnerability in xEpan, which can be exploited to compromise vulnerable web site. | |
Solution: | |
Currently we are not aware of any official solution for this vulnerability. Disclosure timeline: 2014-10-22 Vendor notified via several emails. 2014-10-22 Vendor denies vulnerability. 2014-11-06 Vulnerability is confirmed in the latest version of xEpan 1.0.4 which was released on the 2nd of November (we initially suspected a "silent fix"). 2014-11-06 Vulnerability confirmed in 1.0.4 as well. Vendor notified about the problem once again. 2014-11-10 Fix requested via several emails. 2014-11-17 Fix requested via several emails. 2014-11-24 Fix requested via several emails. 2014-11-24 Vulnerability still exist in latest version 1.0.4.1 which was released at November, 20. 2014-11-26 Public disclosure. | |
References: | |
[1] High-Tech Bridge Advisory HTB23240 - https://www.immuniweb.com/advisory/HTB23240 - Сross-Site Request Forgery (CSRF) in xEpan. [2] xEpan - http://www.xepan.org/ - xEpan is a an open source content management system (CMS) with Drag & Drop, bootstrap and live text editing. [3] Common Vulnerabilities and Exposures (CVE) - http://cve.mitre.org/ - international in scope and free for public use, CVE® is a dictionary of publicly known information security vulnerabilities and exposures. [4] Common Weakness Enumeration (CWE) - http://cwe.mitre.org - targeted to developers and security practitioners, CWE is a formal list of software weakness types. [5] ImmuniWeb® - Leveraging the power of machine-learning and genius of human brain to deliver the most advanced web application security and penetration testing. [6] ImmuniWeb® SSLScan - Test your servers for security and compliance with PCI DSS, HIPAA and NIST. | |
Please feel free to send us any additional information related to this Advisory, such as vulnerable versions, additional exploitation details and conditions, patches and other relevant details.