Misconfiguration in message sending function in instantsoft/icms2
Reported on
Aug 10th 2023
Description
Web application misconfiguration in messaging function. This vulnerability results in a user's messages being automatically sent to all other users. This results in the user's information potentially being exposed
Proof of Concept
link video Poc https://drive.google.com/file/d/1eXQXJAeIJ0KVWAKRUeBtvgNZzHW_3la_/view?usp=sharing
Steps
1 . Login to admin account with chorme browser and login to demo account with another browser
2 . Using demo account send message to admin then intercept request with burpsuite and send request to burp repeater for editing
3 . Then fix the contact_id value with 3 , which is the id value of the demo account, let the demo account send messages to itself
4 . After sending a message to yourself, when the demo account sends a message to a certain user, the system will automatically send a message to all users.
Impact
This vulnerability results in a user's messages being automatically sent to all other users. This results in the user's information potentially being exposed
Not exactly as you described, but yes, there is a problem. The PoC needs to be supplemented: Send request /messages/write/3 - here initially substitute id with your own. To create a contact where contact_id and user_id are equal. Thank you for your attention. p.s. the demo version is InstantCMS 2.15.2.
Hello can you please assign it a CVE.
Thank you very much.
@instantsoft/icms2 Hi, can you please specify a CVE for this vulnerability. It's necessary for my work
Hello I don't know how to edit now. There is no such item in the action menu. If you can tell me how to do it again, I will.
Sorry, there's probably no way to re-assign CVEs after committing changes. But if you know it is possible, please let me know.
Fuze, would you like the CVE assigned and published on the 31st of August?
@admin I have not yet received a CVE for this vulnerability
@Fuze I have not yet received a CVE for this vulnerability