Сross-Site Request Forgery (CSRF) in xEpan
This vulnerability was discovered by our security researchers before 2019.
| Advisory ID: | HTB23240 |
| Product: | xEpan |
| Vendor: | Xavoc Technocrats Pvt. Ltd. |
| Vulnerable Versions: | 1.0.1 and probably prior |
| Tested Version: | 1.0.1 |
| Advisory Publication: | October 22, 2014 [without technical details] |
| Vendor Notification: | October 22, 2014 |
| Public Disclosure: | November 26, 2014 |
| Latest Update: | November 26, 2014 |
| Vulnerability Type: | Cross-Site Request Forgery [CWE-352] |
| CVE Reference: | CVE-2014-8429 |
| Risk Level: | Medium |
| CVSSv2 Base Score: | 5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P) |
| Solution Status: | Not Fixed |
| Discovered and Provided: | High-Tech Bridge Security Research Lab |
| Advisory Details: | |
High-Tech Bridge Security Research Lab discovered vulnerability in xEpan, which can be exploited to compromise vulnerable web site. | |
| Solution: | |
| Currently we are not aware of any official solution for this vulnerability. Disclosure timeline: 2014-10-22 Vendor notified via several emails. 2014-10-22 Vendor denies vulnerability. 2014-11-06 Vulnerability is confirmed in the latest version of xEpan 1.0.4 which was released on the 2nd of November (we initially suspected a "silent fix"). 2014-11-06 Vulnerability confirmed in 1.0.4 as well. Vendor notified about the problem once again. 2014-11-10 Fix requested via several emails. 2014-11-17 Fix requested via several emails. 2014-11-24 Fix requested via several emails. 2014-11-24 Vulnerability still exist in latest version 1.0.4.1 which was released at November, 20. 2014-11-26 Public disclosure. | |
| | |
References: | |
| [1] High-Tech Bridge Advisory HTB23240 - https://www.immuniweb.com/advisory/HTB23240 - Сross-Site Request Forgery (CSRF) in xEpan. [2] xEpan - http://www.xepan.org/ - xEpan is a an open source content management system (CMS) with Drag & Drop, bootstrap and live text editing. [3] Common Vulnerabilities and Exposures (CVE) - http://cve.mitre.org/ - international in scope and free for public use, CVE® is a dictionary of publicly known information security vulnerabilities and exposures. [4] Common Weakness Enumeration (CWE) - http://cwe.mitre.org - targeted to developers and security practitioners, CWE is a formal list of software weakness types. [5] ImmuniWeb® - Leveraging the power of machine-learning and genius of human brain to deliver the most advanced web application security and penetration testing. [6] ImmuniWeb® SSLScan - Test your servers for security and compliance with PCI DSS, HIPAA and NIST. | |
Please feel free to send us any additional information related to this Advisory, such as vulnerable versions, additional exploitation details and conditions, patches and other relevant details.