Umbraco – The open source ASP.NET CMS Multiple Vulnerabilities

cPanel releases security patches for 20 critical vulnerabilities
January 27, 2016
cms pentration testing
Refinery – The Ruby on Rail Open Source CMS Penetration Testing Report
February 19, 2016

February 16, 2016

Vulnerable Umbraco

Recently I got an assignment where I had to work on the Umbraco application – a free Open Source Content Management System built on the ASP.NET platform and is used by more than 2,25,000 websites. While performing the security testing of this application, I discovered serious vulnerabilities within this application, allowing to perform SSRF attack, CSRF Bypass attack, and persistent XSS. The CVE number yet to be assigned to these vulnerabilities. It would be strongly recommended to update the CMS to latest version.

SSRF Vulnerability in Feedproxy.aspx (CVE-2015-8813)

Let me get start with Server side request forgery (ssrf) attack found within the feedproxy.aspx. Those who new to SSRF, please follow this link.

I started off playing with the feedproxy.aspx, it is intersting page in Umbraco . the feedproxy.aspx is used to access the external resources using the URL GET parameter.

http://local/Umbraco/feedproxy.aspx?url=http://bobsite/index

once you change the URL to the http://local/Umbraco/feedproxy.aspx?url=http://127.0.0.1:80/index, you able to access the localhost application of the server.

Using this payload change the port number to perform port scanning of the server. It will be helpful to find the more details of the server.
For example:

http://local/Umbraco/feedproxy.aspx?url=http://127.0.0.1:25/index
http://local/Umbraco/feedproxy.aspx?url=http://127.0.0.1:8080/index

If the port number is closed, you will find the error message on the feedproxy.aspx page. Umbraco assigned bug ID U4-7457 and fixed the issue by adding && requestUri.Port == 80. 

Fix commit:

https://github.com/umbraco/Umbraco-CMS/commit/924a016ffe7ae7ea6d516c07a7852f0095eddbce

CSRF Bypass Vulnerability (CVE-2015-8814)

The Umbraco assigned bug ID U4-7459, It was discovered that Umbraco enabled sensitive actions, such as editing a user account information was vulnerable to CSRF vulnerability.
The vulnerable code in templates.asmx.cs on the line number 75, it is executing save operation without verifying the actual CSRF token.
In the file SetAngularAntiForgeryTokensAttributes.cs, on line number 25, function allowing empty CSRF value, the CSRF vulnerability is triggering.

Find the more details on this fix on the below given link:

https://github.com/umbraco/Umbraco-CMS/commit/18c3345e47663a358a042652e697b988d6a380eb

Persistent XSS Vulnerability(CVE-2015-8815)

It is found that Umbraco is also vulnerable to Persistent XSS in content type editor. Umbraco has been assigned bug ID U4-7461.. This vulnerability existed in the name field of the media page, the developer data edit page, and the form page.XSS Vulnerability in Umbraco

XSS Vulneraiblity in Umbraco

XSS Vulnerability Umbraco

To mitigate these vulnerabilities, it is recommended to update Umbraco to the version V7.4.0.

Discover more from SecureLayer7 - Offensive Security, API Scanner & Attack Surface Management

Subscribe now to keep reading and get access to the full archive.

Continue reading

Enable Notifications OK No thanks