[HSC] Bitweaver XSS & SQL Injection Vulnerability
Bitweaver is an open source content management system. Its speed and
power are ideal for large-scale community websites and corporate
applications,
but it is simple enough for non-technical small site users to set up and
administrate. It comes fully featured on install but is easy to extend.
Hackers Center Security Group (http://www.hackerscenter.com)
Credit: DoZ
Risk: Medium
Class: Cross-Site Scripting & SQL
Vendor: http://www.bitweaver.org/
Product: Bitweaver
Version: 2.0.0 & Previous
Examples:
/users/register.php/XSS
/search/index.php/XSS
/users/login.php?error=XSS
Persistent XSS:
If comments are allowed, attackers can use this url
/wiki/index.php?page_id=1#editcomments
to POST evil scripts and PHP
code<http://www.hackerscenter.com/archive/view.asp?id=28129#>into the
page. Sanitizing the input will prevent intrusion.
Also we see that on forums there is the same issue: (NEED TO SANITIZE THE
INPUT)
/forums/index.php?t=1&post_comment_reply_id=1&post_comment_request=1#editcomments
White Screen of Death: (SQL Injection)
Critical information is listed o nthis page when you inject evil code.
Some work if you inject JavaScript Code into the Search box and some show
this page by following url: /wiki/list_pages.php?sort_mode='
By Search:
/search/index.php?tk=316dccdfb62a3cad613e&highlight=[SQL_INJECTION]=&search=go
Google Dork: Powered by bitweaver