<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title><![CDATA[FrontAccounting forum — Security Vulnerability Reported v2.4.3 CSRF]]></title>
		<link>https://frontaccounting.com/punbb/viewtopic.php?id=7338</link>
		<atom:link href="https://frontaccounting.com/punbb/extern.php?action=feed&amp;tid=7338&amp;type=rss" rel="self" type="application/rss+xml" />
		<description><![CDATA[The most recent posts in Security Vulnerability Reported v2.4.3 CSRF.]]></description>
		<lastBuildDate>Tue, 27 Feb 2018 11:13:03 +0000</lastBuildDate>
		<generator>PunBB</generator>
		<item>
			<title><![CDATA[Re: Security Vulnerability Reported v2.4.3 CSRF]]></title>
			<link>https://frontaccounting.com/punbb/viewtopic.php?pid=30913#p30913</link>
			<description><![CDATA[<p>Thanks Apmuthu. Well noted.</p>]]></description>
			<author><![CDATA[null@example.com (albertolima)]]></author>
			<pubDate>Tue, 27 Feb 2018 11:13:03 +0000</pubDate>
			<guid>https://frontaccounting.com/punbb/viewtopic.php?pid=30913#p30913</guid>
		</item>
		<item>
			<title><![CDATA[Re: Security Vulnerability Reported v2.4.3 CSRF]]></title>
			<link>https://frontaccounting.com/punbb/viewtopic.php?pid=30870#p30870</link>
			<description><![CDATA[<p>Looks like this is an old CSRF vulnerability for FA v2.3.4 as of 2011-03-05 wrongly posted here as for v2.4.3.<br />https://0day.today/exploit/16029</p>]]></description>
			<author><![CDATA[null@example.com (apmuthu)]]></author>
			<pubDate>Wed, 21 Feb 2018 08:50:47 +0000</pubDate>
			<guid>https://frontaccounting.com/punbb/viewtopic.php?pid=30870#p30870</guid>
		</item>
		<item>
			<title><![CDATA[Re: Security Vulnerability Reported v2.4.3 CSRF]]></title>
			<link>https://frontaccounting.com/punbb/viewtopic.php?pid=30861#p30861</link>
			<description><![CDATA[<p>There was a CSRF case for a while <a href="https://frontaccounting.com/punbb/viewtopic.php?id=3468">in FA v2.3.12 stated in my post then</a>.</p><p>The said file <strong>admin/users.php</strong> was last modified on 2015-05-10.</p><p>The Exploit form when submitted will return the following:<br /></p><div class="codebox"><pre><code>{
    &quot;id&quot;:&quot;0&quot;
   ,&quot;js&quot;:[
    {
    &quot;n&quot;:&quot;up&quot;
   ,&quot;t&quot;:&quot;_page_body&quot;
   ,&quot;why&quot;:&quot;_page_body&quot;
   ,&quot;data&quot;:&quot;&lt;br&gt;&lt;br&gt;&lt;form method=&#039;post&#039; action=&#039;\/frontaccounting\/admin\/users.php?&#039; name=&#039;loginform&#039;&gt;\n&lt;center&gt;&lt;table class=&#039;login&#039; cellpadding=&#039;2&#039; cellspacing=&#039;0&#039;&gt;\n&lt;tr&gt;\n&lt;td align=&#039;center&#039; colspan=2&gt;&lt;a target=&#039;_blank&#039; href=&#039;http:\/\/frontaccounting.com&#039;&gt;&lt;img src=&#039;..\/themes\/default\/images\/logo_frontaccounting.png&#039; alt=&#039;FrontAccounting&#039; height=&#039;50&#039; onload=&#039;fixPNG(this)&#039; border=&#039;0&#039; &gt;&lt;\/a&gt;&lt;\/td&gt;\n&lt;\/tr&gt;\n&lt;tr&gt;&lt;td colspan=2 class=&#039;tableheader&#039;&gt;Version 2.4.3   Build 04.02.2018 - Login&lt;\/td&gt;&lt;\/tr&gt;\n&lt;tr&gt;&lt;td class=&#039;label&#039;&gt;User name&lt;\/td&gt;&lt;td&gt;&lt;input  type=\&quot;text\&quot; name=\&quot;user_name_entry_field\&quot; size=\&quot;20\&quot; maxlength=\&quot;30\&quot; value=\&quot;\&quot;&gt;&lt;\/td&gt;\n&lt;\/tr&gt;\n&lt;tr&gt;&lt;td class=&#039;label&#039;&gt;Password:&lt;\/td&gt;&lt;td &gt;&lt;input type=&#039;password&#039; name=&#039;password&#039; size=20 maxlength=20 value=&#039;&#039; &gt;&lt;\/td&gt;\n&lt;\/tr&gt;\n&lt;tr&gt;&lt;td&gt;Company&lt;\/td&gt;&lt;td&gt;&lt;select name=&#039;company_login_name&#039;&gt;\n&lt;option value=0 selected&gt;Default24 Company&lt;\/option&gt;&lt;option value=1 &gt;Training24 Co&lt;\/option&gt;&lt;option value=2 &gt;South Africa Company&lt;\/option&gt;&lt;\/select&gt;\n&lt;\/td&gt;&lt;\/tr&gt;&lt;tr&gt;\n&lt;td colspan=2 align=&#039;center&#039; id=&#039;log_msg&#039;&gt;Please login here&lt;\/td&gt;\n&lt;\/tr&gt;\n&lt;\/table&gt;&lt;\/center&gt;\n&lt;br&gt;&lt;input type=&#039;hidden&#039; id=ui_mode name=&#039;ui_mode&#039; value=&#039;&#039; &gt;\n&lt;center&gt;&lt;input type=&#039;submit&#039; value=&#039;&amp;nbsp;&amp;nbsp;Login --&gt;&amp;nbsp;&amp;nbsp;&#039; name=&#039;SubmitUser&#039; onclick=&#039;set_fullmode();&#039; &gt;&lt;\/center&gt;\n&lt;input type=&#039;hidden&#039; name=&#039;show_inactive&#039; value=&#039;&#039;&gt;&lt;input type=&#039;hidden&#039; name=&#039;user_id&#039; value=&#039;Newadmin&#039;&gt;&lt;input type=&#039;hidden&#039; name=&#039;real_name&#039; value=&#039;New Admin&#039;&gt;&lt;input type=&#039;hidden&#039; name=&#039;phone&#039; value=&#039;&#039;&gt;&lt;input type=&#039;hidden&#039; name=&#039;email&#039; value=&#039;&#039;&gt;&lt;input type=&#039;hidden&#039; name=&#039;role_id&#039; value=&#039;8&#039;&gt;&lt;input type=&#039;hidden&#039; name=&#039;language&#039; value=&#039;C&#039;&gt;&lt;input type=&#039;hidden&#039; name=&#039;pos&#039; value=&#039;1&#039;&gt;&lt;input type=&#039;hidden&#039; name=&#039;print_profile&#039; value=&#039;&#039;&gt;&lt;input type=&#039;hidden&#039; name=&#039;rep_popup&#039; value=&#039;1&#039;&gt;&lt;input type=&#039;hidden&#039; name=&#039;ADD_ITEM&#039; value=&#039;Add new&#039;&gt;&lt;input type=&#039;hidden&#039; name=&#039;_focus&#039; value=&#039;user_id&#039;&gt;&lt;input type=&#039;hidden&#039; name=&#039;_modified&#039; value=&#039;0&#039;&gt;&lt;input type=&#039;hidden&#039; name=&#039;_confirmed&#039; value=&#039;&#039;&gt;&lt;input type=&#039;hidden&#039; name=&#039;_token&#039; value=&#039;Ta6aiT2xqlL2vg8u9aAvagxx&#039;&gt;&lt;input type=&#039;hidden&#039; name=&#039;_random&#039; value=&#039;757897.6552143205\r\n&#039;&gt;&lt;br&gt;&lt;input type=\&quot;hidden\&quot; name=\&quot;_focus\&quot; value=\&quot;user_id\&quot;&gt;&lt;input type=\&quot;hidden\&quot; name=\&quot;_modified\&quot; value=\&quot;0\&quot;&gt;&lt;input type=\&quot;hidden\&quot; name=\&quot;_confirmed\&quot; value=\&quot;\&quot;&gt;&lt;input type=\&quot;hidden\&quot; name=\&quot;_token\&quot; value=\&quot;A83xncEdy_cwjfrIEHd03wxx\&quot;&gt;&lt;\/form&gt;\n&lt;script language=&#039;JavaScript&#039; type=&#039;text\/javascript&#039;&gt;\n    \/\/&lt;![CDATA[\n            &lt;!--\n            document.forms[0].user_name_entry_field.select();\n            document.forms[0].user_name_entry_field.focus();\n            \/\/--&gt;\n    \/\/]]&gt;\n    &lt;\/script&gt;&quot;
    }
   ,{
    &quot;n&quot;:&quot;js&quot;
   ,&quot;why&quot;:true
   ,&quot;data&quot;:&quot;document.forms[0].password.focus();&quot;
   }
   ]
   ,&quot;text&quot;:&quot;&quot;
}</code></pre></div><p>When the exploit form was submitted after having logged in, the following page is output:<br /></p><div class="codebox"><pre><code>{
    &quot;id&quot;:&quot;0&quot;
   ,&quot;js&quot;:[
    {
    &quot;n&quot;:&quot;up&quot;
   ,&quot;t&quot;:&quot;_page_body&quot;
   ,&quot;why&quot;:&quot;_page_body&quot;
   ,&quot;data&quot;:&quot;&lt;form method=&#039;post&#039; action=&#039;\/frontaccounting\/admin\/users.php&#039; &gt;\n&lt;center&gt;&lt;table class=&#039;tablestyle&#039; cellpadding=&#039;2&#039; cellspacing=&#039;0&#039;&gt;\n&lt;tr&gt;\n&lt;td class=&#039;tableheader&#039; &gt;User login&lt;\/td&gt;\n&lt;td class=&#039;tableheader&#039; &gt;Full Name&lt;\/td&gt;\n&lt;td class=&#039;tableheader&#039; &gt;Phone&lt;\/td&gt;\n&lt;td class=&#039;tableheader&#039; &gt;E-mail&lt;\/td&gt;\n&lt;td class=&#039;tableheader&#039; &gt;Last Visit&lt;\/td&gt;\n&lt;td class=&#039;tableheader&#039; &gt;Access Level&lt;\/td&gt;\n&lt;td class=&#039;tableheader&#039; &gt;&lt;\/td&gt;\n&lt;td class=&#039;tableheader&#039; &gt;&lt;\/td&gt;\n&lt;\/tr&gt;\n&lt;tr class=&#039;evenrow&#039;&gt;\n&lt;td &gt;admin&lt;\/td&gt;\n&lt;td &gt;Administrator&lt;\/td&gt;\n&lt;td &gt;&lt;\/td&gt;\n&lt;td &gt;&lt;a href=&#039;mailto:adm@example.com&#039;&gt;adm@example.com&lt;\/a&gt;&lt;\/td&gt;\n&lt;td nowrap&gt;02\/21\/2018&lt;\/td&gt;\n&lt;td &gt;System Administrator&lt;\/td&gt;\n&lt;td align=&#039;center&#039;&gt;&lt;button type=&#039;submit&#039; class=&#039;editbutton&#039; name=&#039;Edit1&#039; value=&#039;1&#039; title=&#039;Edit&#039; &gt;&lt;img src=&#039;..\/themes\/default\/images\/edit.gif&#039; style=&#039;vertical-align:middle;width:12px;height:12px;border:0;&#039; &gt;\n&lt;\/button&gt;\n&lt;\/td&gt;&lt;td &gt;&lt;\/td&gt;\n&lt;\/tr&gt;\n&lt;tr&gt;&lt;td colspan=8&gt;&lt;div style=&#039;float:left;&#039;&gt;&lt;input type=&#039;checkbox&#039; name=&#039;show_inactive&#039; value=&#039;1&#039; onclick=&#039;JsHttpRequest.request(\&quot;_show_inactive_update\&quot;, this.form);&#039; &gt;\nShow also Inactive&lt;\/div&gt;&lt;div style=&#039;float:right;&#039;&gt;&lt;button class=\&quot;inputsubmit\&quot; type=\&quot;submit\&quot; style=&#039;display:none;&#039; name=\&quot;Update\&quot;  id=\&quot;Update\&quot; value=\&quot;Update\&quot;&gt;&lt;span&gt;Update&lt;\/span&gt;&lt;\/button&gt;\n&lt;\/div&gt;&lt;\/td&gt;&lt;\/tr&gt;&lt;\/table&gt;&lt;\/center&gt;\n&lt;br&gt;&lt;center&gt;&lt;table class=&#039;tablestyle2&#039; cellpadding=&#039;2&#039; cellspacing=&#039;0&#039;&gt;\n&lt;tr&gt;&lt;td class=&#039;label&#039;&gt;User Login:&lt;\/td&gt;&lt;td&gt;&lt;input  type=\&quot;text\&quot; name=\&quot;user_id\&quot; size=\&quot;22\&quot; maxlength=\&quot;20\&quot; value=\&quot;Newadmin\&quot;&gt;&lt;\/td&gt;\n&lt;\/tr&gt;\n&lt;tr&gt;&lt;td class=&#039;label&#039;&gt;Password:&lt;\/td&gt;&lt;td &gt;&lt;input type=&#039;password&#039; name=&#039;password&#039; size=20 maxlength=20 value=&#039;&#039; &gt;&lt;\/td&gt;\n&lt;\/tr&gt;\n&lt;tr&gt;&lt;td class=&#039;label&#039;&gt;Full Name:&lt;\/td&gt;&lt;td&gt;&lt;input  type=\&quot;text\&quot; name=\&quot;real_name\&quot; size=\&quot;50\&quot; maxlength=\&quot;50\&quot; value=\&quot;New Admin\&quot; &gt;&lt;\/td&gt;\n&lt;\/tr&gt;\n&lt;tr&gt;&lt;td class=&#039;label&#039;&gt;Telephone No.:&lt;\/td&gt;&lt;td&gt;&lt;input  type=\&quot;text\&quot; name=\&quot;phone\&quot; size=\&quot;30\&quot; maxlength=\&quot;30\&quot; value=\&quot;\&quot; &gt;&lt;\/td&gt;\n&lt;\/tr&gt;\n&lt;tr&gt;&lt;td class=&#039;label&#039;&gt;Email Address:&lt;\/td&gt;&lt;td&gt;&lt;input  type=\&quot;text\&quot; name=\&quot;email\&quot; size=\&quot;50\&quot; maxlength=\&quot;50\&quot; value=\&quot;\&quot; &gt;&lt;\/td&gt;\n&lt;\/tr&gt;\n&lt;tr&gt;&lt;td class=&#039;label&#039;&gt;Access Level:&lt;\/td&gt;&lt;td&gt;&lt;span id=&#039;_role_id_sel&#039;&gt;&lt;select id=&#039;role_id&#039; autocomplete=&#039;off&#039;  name=&#039;role_id&#039; class=&#039;combo&#039; title=&#039;&#039; &gt;&lt;option selected  value=&#039;8&#039;&gt;AP Officer&lt;\/option&gt;\n&lt;option   value=&#039;7&#039;&gt;AR Officer&lt;\/option&gt;\n&lt;option   value=&#039;1&#039;&gt;Inquiries&lt;\/option&gt;\n&lt;option   value=&#039;9&#039;&gt;Accountant&lt;\/option&gt;\n&lt;option   value=&#039;5&#039;&gt;Production Manager&lt;\/option&gt;\n&lt;option   value=&#039;6&#039;&gt;Purchase Officer&lt;\/option&gt;\n&lt;option   value=&#039;3&#039;&gt;Salesman&lt;\/option&gt;\n&lt;option   value=&#039;4&#039;&gt;Stock Manager&lt;\/option&gt;\n&lt;option   value=&#039;10&#039;&gt;Sub Admin&lt;\/option&gt;\n&lt;option   value=&#039;2&#039;&gt;System Administrator&lt;\/option&gt;\n&lt;\/select&gt;\n&lt;\/span&gt;\n&lt;\/td&gt;\n&lt;\/tr&gt;\n&lt;tr&gt;&lt;td class=&#039;label&#039;&gt;Language:&lt;\/td&gt;&lt;td&gt;&lt;span id=&#039;_language_sel&#039;&gt;&lt;select autocomplete=&#039;off&#039;  name=&#039;language&#039; class=&#039;combo&#039; title=&#039;&#039;&gt;&lt;option selected value=&#039;C&#039;&gt;English&lt;\/option&gt;\n&lt;\/select&gt;\n&lt;\/span&gt;\n&lt;\/td&gt;\n&lt;\/tr&gt;\n&lt;tr&gt;&lt;td class=&#039;label&#039;&gt;User&#039;s POS:&lt;\/td&gt;\n&lt;td&gt;&lt;span id=&#039;_pos_sel&#039;&gt;&lt;select id=&#039;pos&#039; autocomplete=&#039;off&#039;  name=&#039;pos&#039; class=&#039;combo&#039; title=&#039;&#039; &gt;&lt;option selected  value=&#039;1&#039;&gt;Default&lt;\/option&gt;\n&lt;\/select&gt;\n&lt;\/span&gt;\n&lt;\/td&gt;&lt;\/tr&gt;\n&lt;tr&gt;&lt;td class=&#039;label&#039;&gt;Printing profile:&lt;\/td&gt;\n&lt;td&gt;&lt;span id=&#039;_print_profile_sel&#039;&gt;&lt;select autocomplete=&#039;off&#039;  name=&#039;print_profile&#039; class=&#039;combo&#039; title=&#039;&#039;&gt;&lt;option selected value=&#039;&#039;&gt;Browser printing support&lt;\/option&gt;\n&lt;option  value=&#039;Central&#039;&gt;Central&lt;\/option&gt;\n&lt;option  value=&#039;Out of office&#039;&gt;Out of office&lt;\/option&gt;\n&lt;option  value=&#039;Sales Department&#039;&gt;Sales Department&lt;\/option&gt;\n&lt;\/select&gt;\n&lt;\/span&gt;\n&lt;input  type=&#039;submit&#039; class=&#039;combo_select&#039; style=&#039;border:0;background:url(..\/themes\/default\/images\/button_ok.png) no-repeat;display:none;&#039; aspect=&#039;fallback&#039; name=&#039;_print_profile_update&#039; value=&#039; &#039; title=&#039;Select&#039;&gt; \n&lt;\/td&gt;&lt;\/tr&gt;\n&lt;tr&gt;&lt;td class=&#039;label&#039;&gt;Use popup window for reports:&lt;\/td&gt;&lt;td &gt;&lt;input checked type=&#039;checkbox&#039; name=&#039;rep_popup&#039; value=&#039;1&#039; title=&#039;Set this option to on if your browser directly supports pdf files&#039; &gt;\n&lt;\/td&gt;&lt;\/tr&gt;\n&lt;\/table&gt;&lt;\/center&gt;\n&lt;br&gt;&lt;center&gt;&lt;button class=\&quot;ajaxsubmit\&quot; type=\&quot;submit\&quot; aspect=&#039;default&#039;  name=\&quot;ADD_ITEM\&quot;  id=\&quot;ADD_ITEM\&quot; value=\&quot;Add new\&quot;&gt;&lt;img src=&#039;..\/themes\/default\/images\/ok.gif&#039; height=&#039;12&#039; alt=&#039;&#039;&gt;&lt;span&gt;Add new&lt;\/span&gt;&lt;\/button&gt;\n&lt;\/center&gt;&lt;input type=\&quot;hidden\&quot; name=\&quot;_focus\&quot; value=\&quot;user_id\&quot;&gt;&lt;input type=\&quot;hidden\&quot; name=\&quot;_modified\&quot; value=\&quot;0\&quot;&gt;&lt;input type=\&quot;hidden\&quot; name=\&quot;_confirmed\&quot; value=\&quot;\&quot;&gt;&lt;input type=\&quot;hidden\&quot; name=\&quot;_token\&quot; value=\&quot;xug4LnCbMhztG65aZRdVUgxx\&quot;&gt;&lt;\/form&gt;\n&lt;center&gt;&lt;center&gt;&lt;table width=&#039;20%&#039; cellpadding=&#039;2&#039; cellspacing=&#039;0&#039;&gt;\n&lt;tr&gt;\n&lt;td align=center&gt;&lt;a href=&#039;javascript:goBack();&#039;&gt;Back&lt;\/a&gt;&lt;\/td&gt;\n&lt;\/tr&gt;\n&lt;\/table&gt;&lt;\/center&gt;\n&lt;\/center&gt;&lt;br&gt;&quot;
    }
   ,{
    &quot;n&quot;:&quot;fc&quot;
   ,&quot;why&quot;:true
   ,&quot;data&quot;:&quot;user_id&quot;
   }
   ,{
     &quot;n&quot;:&quot;js&quot;
    ,&quot;why&quot;:&quot;editors&quot;
    ,&quot;data&quot;:&quot;editors = [  ];&quot;
    }
    ]
   ,&quot;text&quot;:&quot;&lt;div class=&#039;err_msg&#039;&gt;Request from outside of this page is forbidden.&lt;\/div&gt;&quot;
}</code></pre></div><p>Hence it is seen that it is not affected.<br />The hidden field <strong>_token</strong> is present in the form and is checked by the server side and hence protects it from malicious submitted data.<br />This was tested in the FA 2.4.3+ <a href="https://github.com/FrontAccountingERP/FA/archive/2b58a999e31c48e47358d9c9e87b0f69849f029f.zip">Current Git Master</a> using PHP 5.3.1 on XAMPP 1.7.3. If this issue persists in other installs, indicate versions of PHP / MySQL / WebServer used.</p>]]></description>
			<author><![CDATA[null@example.com (apmuthu)]]></author>
			<pubDate>Wed, 21 Feb 2018 07:35:00 +0000</pubDate>
			<guid>https://frontaccounting.com/punbb/viewtopic.php?pid=30861#p30861</guid>
		</item>
		<item>
			<title><![CDATA[Security Vulnerability Reported v2.4.3 CSRF]]></title>
			<link>https://frontaccounting.com/punbb/viewtopic.php?pid=30860#p30860</link>
			<description><![CDATA[<p>Hi all,<br />Just saw this vulnerability announced on the US National Vulnerability Database.<br /><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-7176">https://nvd.nist.gov/vuln/detail/CVE-2018-7176</a></p><p>It says:<br /><strong>Cross Site Request Forgery- Front Accounting ERP 2.4.3</strong><br /><em>FrontAccounting 2.4.3 suffers from a CSRF flaw, which leads to adding a user account via admin/users.php (aka the &quot;add user&quot; feature of the User Permissions page).</em></p><p>Do we have any security expert in the forum that could look into this?</p><div class="quotebox"><blockquote><p>CVE Dictionary Entry: CVE-2018-7176<br />Original release date: 02/15/2018<br />Last revised: 02/18/2018<br />Source: US-CERT/NIST</p><p>This vulnerability is currently awaiting analysis.<br />CVE-2018-7176 Detail: AWAITING ANALYSIS</p></blockquote></div>]]></description>
			<author><![CDATA[null@example.com (albertolima)]]></author>
			<pubDate>Wed, 21 Feb 2018 03:04:44 +0000</pubDate>
			<guid>https://frontaccounting.com/punbb/viewtopic.php?pid=30860#p30860</guid>
		</item>
	</channel>
</rss>
