Multiple vulnerabilities in Subrion CMS



Published: 2020-04-30
Risk Medium
Patch available NO
Number of vulnerabilities 3
CVE-ID CVE-2020-12467
CVE-2020-12468
CVE-2020-12469
CWE-ID CWE-384
CWE-94
CWE-502
Exploitation vector Network
Public exploit Public exploit code for vulnerability #1 is available.
Public exploit code for vulnerability #2 is available.
Public exploit code for vulnerability #3 is available.
Vulnerable software
Subscribe
Subrion CMS
Web applications / CMS

Vendor Intelliants

Security Bulletin

This security bulletin contains information about 3 vulnerabilities.

1) Session Fixation

EUVDB-ID: #VU27472

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2020-12467

CWE-ID: CWE-384 - Session Fixation

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to sensitive information on the system.

The vulnerability exists due to insufficient session validation in an alphanumeric value in a session cookie. A remote attacker can hijacking the user-validated session by forcing an arbitrary session ID

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

Subrion CMS: 4.2.1


CPE2.3 External links

http://github.com/belong2yourself/vulnerabilities/tree/master/Subrion%20CMS/Session%20Fixation

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

2) CSV Injection

EUVDB-ID: #VU27473

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2020-12468

CWE-ID: CWE-94 - Improper Control of Generation of Code ('Code Injection')

Exploit availability: No

Description

The vulnerability allows a remote attacker to inject arbitrary code into CSV files.

The vulnerability exists within "phrases/add/" and "languages/download/" due to insufficient sanitization of user-supplied data when constructing CSV files in the numerous fields. A remote attacker can inject malicious data into the contact form fields that is used later by the plugin to generate CSV files. Such files can be opened with Microsoft Excel built-in functions and utilize its functionality to execute malicious macros.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

Subrion CMS: 4.2.1


CPE2.3 External links

http://github.com/belong2yourself/vulnerabilities/tree/master/Subrion%20CMS/CSV%20Injection

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

3) Deserialization of Untrusted Data

EUVDB-ID: #VU27474

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2020-12469

CWE-ID: CWE-502 - Deserialization of Untrusted Data

Exploit availability: No

Description

The vulnerability allows a remote attacker to delete arbitrary files.

The vulnerability exists in "admin/blocks.php" file due to insecure input validation when processing serialized data in the subpages value within a block to blocks/edit. A remote authenticated attacker can pass specially crafted data to the application, cause PHP Object Injection and delete arbitrary files on the target system.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

Subrion CMS: 4.2.1


CPE2.3 External links

http://github.com/belong2yourself/vulnerabilities/tree/master/Subrion%20CMS/Insecure%20Deserialization/Subpages%20-%20Authenticated%20PHP%20Object%20Injection

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?



###SIDEBAR###