###################################################################### # Exploit Title: ProcessMaker v3.0.1.7 Multiple vulnerabilities # Date: 31/05/2016 # Author: Mickael Dorigny @ information-security.fr # Vendor or Software Link: http://www.processmaker.com/ # Version: 3.0.1.7 # Category: Multiple Vulnerabilities ###################################################################### ProcessMaker description : ====================================================================== ProcessMaker Inc. is the developer of the ProcessMaker Workflow & BPM Software Suite. ProcessMaker automates form based, approval driven workflow that improves the way information flows between data and systems. ProcessMaker has been downloaded more than 750,000 times and is currently being used by thousands of companies around the world. ProcessMaker has a network of more than 35 partners located on 5 different continents. Vulnerabilities description : ====================================================================== ProcessMaker v3.0.1.7 is vulnerable to multiple vulnerabilities like : - Reflected XSS - Stored XSS - CSRF (x2) PoC n°1 - CSRF on Designer Project Creation ====================================================================== Designer Project creation process is vulnerable to CSRF vulnerability. a forged request can be used to force an authentified user with designer project creation rights to create a new Designer project. PoC: [REQUEST] http://server/sysworkflow/en/neoclassic/processProxy/saveProcess?type=bpmnProject [POSTDATA] PRO_TITLE=AAA&PRO_DESCRIPTION=BBB&PRO_CATEGORY= The following HTML form can be used to exploit this CSRF vulnerability when mixed to phishing technics or auto-submit javascript tricks :
Note that this CSRF vulnerability can be combined with the PoC n°3 that expose a stored XSS vulnerability in the Description input of Designer Project. Proof of Concept n°2 - CSRF on group creation ====================================================================== Group creation process is vulnerable to CSRF vulnerability, a forged request can be used to force an authentified user with admin rights to create a new group. PoC : [REQUEST] http://server/sysworkflow/en/neoclassic/groups/groups_Ajax?action=saveNewGroup [POSTDATA] name=swdcs&status=1 The following HTML form can be used to exploit this CSRF vulnerability when mixed to phishing technics or auto-submit javascript tricks : Proof of Concept n°3 - Stored XSS on Designer Project Creation ====================================================================== The "description" input of the designer project creation process is vulnerable to stored XSS. A user can use this input to store an XSS an make other user's browsers executes controlled JavaScript instructions. PoC [REQUEST] http://server/sysworkflow/en/neoclassic/processProxy/saveProcess?type=bpmnProject [POSTDATA] PRO_TITLE=AA