SB2018032207 - Multiple vulnerabilities in Frog CMS
Published: March 22, 2018 Updated: August 8, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 14 secuirty vulnerabilities.
1) Code Injection (CVE-ID: CVE-2018-20772)
The vulnerability allows a remote privileged user to execute arbitrary code.
Frog CMS 0.9.5 allows PHP code execution via <?php to the admin/?/layout/edit/1 URI.
2) Code Injection (CVE-ID: CVE-2018-20773)
The vulnerability allows a remote privileged user to execute arbitrary code.
Frog CMS 0.9.5 allows PHP code execution by visiting admin/?/page/edit/1 and inserting additional <?php lines.
3) Cross-site scripting (CVE-ID: CVE-2018-20774)
The vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data when processing the admin/?/layout/edit/1 Body field. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
4) Code Injection (CVE-ID: CVE-2018-20775)
The vulnerability allows a remote privileged user to execute arbitrary code.
admin/?/plugin/file_manager in Frog CMS 0.9.5 allows PHP code execution by creating a new .php file containing PHP code, and then visiting this file under the public/ URI.
5) Information disclosure (CVE-ID: CVE-2018-20776)
The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
Frog CMS 0.9.5 provides a directory listing for a /public request.
6) Cross-site scripting (CVE-ID: CVE-2018-20777)
The vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data when processing the admin/?/snippet/edit/1 Body field. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
7) Cross-site scripting (CVE-ID: CVE-2018-20778)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data passed via "admin/?/plugin/file_manager" when creating a new file containing a crafted attribute of an IMG element. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website .
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
8) Cross-site scripting (CVE-ID: CVE-2019-6243)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks via the forgot password page (aka the /admin/?/login/forgot URI).
The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
9) Cross-site scripting (CVE-ID: CVE-2018-20680)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in the admin/?/page/edit/1 body field. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
10) Cross-site scripting (CVE-ID: CVE-2018-20448)
The vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data when processing the Database name field to the /install/index.php URI. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
11) Arbitrary file upload (CVE-ID: CVE-2018-16373)
The vulnerability allows a remote privileged user to manipulate data.
Frog CMS 0.9.5 has an Upload vulnerability that can create files via /admin/?/plugin/file_manager/save.
12) Cross-site scripting (CVE-ID: CVE-2018-16374)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can permanently inject and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
13) Arbitrary file upload (CVE-ID: CVE-2018-11098)
The vulnerability allows a remote privileged user to execute arbitrary code.
An issue was discovered in Frog CMS 0.9.5. There is a file upload vulnerability via the admin/?/plugin/file_manager/upload URI, a similar issue to CVE-2014-4912.
14) Arbitrary file upload (CVE-ID: CVE-2014-4912)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to insufficient validation of file extension when uploading files. A remote attacker can upload and execute arbitrary file on the system.
Remediation
Cybersecurity Help is not aware of any official remediation provided by the vendor.
References
- https://github.com/philippe/FrogCMS/issues/24
- https://github.com/philippe/FrogCMS/issues/23
- https://github.com/philippe/FrogCMS/issues/26
- https://github.com/philippe/FrogCMS/issues/27
- https://github.com/philippe/FrogCMS/issues/21
- https://github.com/philippe/FrogCMS/issues/25
- https://github.com/philippe/FrogCMS/issues/28
- https://somerandomshitwbu.blogspot.com/2019/01/another-xss-on-frog-cms-open-source.html
- https://github.com/philippe/FrogCMS/issues/22
- https://github.com/philippe/FrogCMS/issues/20
- https://www.exploit-db.com/exploits/46067/
- https://github.com/philippe/FrogCMS/issues/13
- https://github.com/philippe/FrogCMS/issues/14
- https://github.com/philippe/FrogCMS/issues/11
- https://www.exploit-db.com/exploits/33983/