Ivano Binetti has discovered a vulnerability in Contao, which can be exploited by malicious people to conduct cross-site request forgery attacks.
The vulnerability is caused due to the application allowing users to perform certain actions via HTTP requests without performing proper validity checks to verify the requests. This can be exploited to e.g. delete a user, delete news, or delete a newsletter when a logged-in administrative user visits a specially crafted web page.
The vulnerability is confirmed in versions 2.11.0, 2.11.4, and 2.11.9. Other versions may also be affected.
Solution: No official solution is currently available.
Provided and/or discovered by: Ivano Binetti
Original Advisory: http://ivanobinetti.blogspot.com/2012/02/contaocms-fka-typolight-211-csrf-delete.html
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org
Score: 0 Posts: 1 User Since: 21st Feb 2013 System Score: N/A Location: NL Last edited on 21st Feb, 2013 09:07
This issue was fixed and the versions mentioned above were never even vulnerable! Very unprecise issue!
This vulnerability was mentioned on the Contao forum by the lead developer: "The reported issue never really was an issue. To exploit the "vulnerability", the malicious website would have to know the domain name of your Contao installation, which is very unlikely!
Second of all, the request token system prevents this kind of attack, so the report can be considered fixed (and outdated)."