← Advisories

Snowfox CMS v1.0 (rd param) Open Redirect Vulnerability

Low
Advisory ID
ZSL-2014-5206
Release Date
18 November 2014
Vendor
Globiz Solutions - http://www.snowfoxcms.org
Affected Version
1.0
Tested On
Apache/2.4.7 (Win32), PHP/5.5.6, MySQL 5.6.14
Summary

Snowfox is an open source Content Management System (CMS) that allows your website users to create and share content based on permission configurations.

Description

Input passed via the 'rd' GET parameter in 'selectlanguage.class.php' script is not properly verified before being used to redirect users. This can be exploited to redirect a user to an arbitrary website e.g. when a user clicks a specially crafted link to the affected script hosted on a trusted domain.

/modules/system/controller/selectlanguage.class.php: ---------------------- 28: if ($results && isset($inputs['rd'])){ 29: header("location: ".$inputs['rd']); 30: } 31: return $results;
Proof of Concept
Disclosure Timeline
20.11.2014Vendor releases version 1.0.10 to address this issue.
Credits
Vulnerability discovered by Gjoko Krstic
References
Changelog
18.11.2014Initial release
19.11.2014Added reference [1], [2] and [3]
20.11.2014Added vendor status and reference [4], [5] and [6]
09.12.2014Added reference [7] and [8]