{"id":16683,"date":"2021-07-07T16:26:17","date_gmt":"2021-07-07T14:26:17","guid":{"rendered":"https:\/\/herolab-usd.formwandler.rocks\/security-advisories\/usd-2020-0031\/"},"modified":"2021-07-19T14:15:40","modified_gmt":"2021-07-19T12:15:40","slug":"usd-2020-0031","status":"publish","type":"page","link":"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2020-0031\/","title":{"rendered":"usd-2020-0031"},"content":{"rendered":"<p>[et_pb_section fb_built=\"1\" _builder_version=\"4.9.4\" _module_preset=\"default\" background_color=\"#2E353D\" custom_padding=\"||0px|||\"][et_pb_row _builder_version=\"4.9.4\" _module_preset=\"default\"][et_pb_column type=\"4_4\" _builder_version=\"4.9.4\" _module_preset=\"default\"][et_pb_text _builder_version=\"4.9.4\" _module_preset=\"cc5ac6f4-ebbd-4b3f-bc92-4dfc1f15fe2c\"]<\/p>\n<h1 class=\"h-custom-headline usd-small-letters h2\"><span>usd-2020-0031 | Gambio GX 4.0.0.0<\/span><\/h1>\n<p><span><\/span><br \/><strong>Advisory ID<\/strong><span>: usd-2020-0031<\/span><br \/><strong>CVE Number<\/strong><span>: CVE-2020-10984<\/span><br \/><strong>Affected Product<\/strong><span>: Gambio GX<\/span><br \/><strong>Affected Version<\/strong><span>: 4.0.0.0<\/span><br \/><strong>Vulnerability Type<\/strong><span>: Cross-Site-Request-Forgery (CSRF)<\/span><br \/><strong>Security Risk<\/strong><span>: Critical<\/span><br \/><strong>Vendor URL<\/strong><span>: <a href=\"https:\/\/www.gambio.de\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.gambio.de\/<\/a><\/span><br \/><strong>Vendor Status<\/strong><span>: Fixed in 4.0.1.0 (according to vendor)<\/span><\/p>\n<h3><\/h3>\n<h3>Description<\/h3>\n<p><span>The open source application is vulnerable to a number of Cross-Site Request Forgery (CSRF) attacks. CSRF is an attack that forces an end user to execute unwanted actions on a web application in which they are currently authenticated. A lot of critical functions are executed from the shop backend which is not secured against CSRF attacks. In the worst case CSRF can lead to code execution.<\/span><\/p>\n<p><span><\/span><\/p>\n<h3>Proof of Concept (PoC)<\/h3>\n<p><span>An attacker could create an HTML page with the following content:<\/span><\/p>\n<p>[\/et_pb_text][et_pb_image src=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2021\/07\/usd20200031-1.png\" title_text=\"usd20200031-1\" _builder_version=\"4.9.4\" _module_preset=\"default\" custom_margin=\"27px||43px||false|false\"][\/et_pb_image][et_pb_text _builder_version=\"4.9.4\" _module_preset=\"default\"]<\/p>\n<p>An already authenticated backend user who visits the attacker\u2019s site and presses the \u201eSubmit request\u201c button would, unknowingly, upload a php file. The file will be stored into <em>\/media\/content\/webshell.php<\/em>\u00a0and allow code execution for the attacker.<\/p>\n<p>The following request allows an attacker to view the <em>\/etc\/passwd<\/em>\u00a0file:<\/p>\n<p>[\/et_pb_text][et_pb_image src=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2021\/07\/usd20200031-2.png\" title_text=\"usd20200031-2\" _builder_version=\"4.9.4\" _module_preset=\"default\"][\/et_pb_image][et_pb_text _builder_version=\"4.9.4\" _module_preset=\"cc5ac6f4-ebbd-4b3f-bc92-4dfc1f15fe2c\"]<\/p>\n<div class=\"e16902-22 x-container max width\">\n<div class=\"e16902-23 x-column x-sm x-1-1\">\n<h3>Fix<\/h3>\n<p><span>By using token-based requests CSRF can be prevented. It can be achieved either with state (synchronizer token pattern) or stateless (encrypted or hashed based token pattern). CSRF tokens should be generated on the server-side. They can either be generated once per user session or for each request. An attacker would therefore have to guess or know the randomly generated token for a successful attack.<\/span><\/p>\n<h3><\/h3>\n<h3>Timeline<\/h3>\n<ul>\n<li>2020-03-25 Vulnerability Discovered<\/li>\n<li>2020-03-26 Initial Contact Request<\/li>\n<li>2020-03-26 Advisory submitted to vendor<\/li>\n<li>2020-05-04 Vendor publishes fix in Beta Version of Gambio GX 4.0.1.0 Beta1 <a href=\"https:\/\/tracker.gambio-server.net\/issues\/66736\" target=\"_blank\" rel=\"noopener\">https:\/\/tracker.gambio-server.net\/issues\/66736<\/a><\/li>\n<li>2020-05 Vendor publishes 4.0.1.0 <a href=\"https:\/\/developers.gambio.de\/changelog\/#bugfix4.0.1.0\" target=\"_blank\" rel=\"noopener\">https:\/\/developers.gambio.de\/changelog\/#bugfix4.0.1.0<\/a><\/li>\n<li>2020-06-18\u00a0Security advisory released<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3><\/h3>\n<h3>Credits<\/h3>\n<p><span>This security vulnerability was found by Gerbert Roitburd of usd AG.<\/span><\/p>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>usd-2020-0031 | Gambio GX 4.0.0.0 Advisory ID: usd-2020-0031CVE Number: CVE-2020-10984Affected Product: Gambio GXAffected Version: 4.0.0.0Vulnerability Type: Cross-Site-Request-Forgery (CSRF)Security Risk: CriticalVendor URL: https:\/\/www.gambio.de\/Vendor Status: Fixed in 4.0.1.0 (according to vendor) Description The open source application is vulnerable to a number of Cross-Site Request Forgery (CSRF) attacks. CSRF is an attack that forces an end user to [&hellip;]<\/p>\n","protected":false},"author":96,"featured_media":0,"parent":16124,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-16683","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/16683","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/users\/96"}],"replies":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/comments?post=16683"}],"version-history":[{"count":0,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/16683\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/16124"}],"wp:attachment":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/media?parent=16683"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}