Bitweaver XSS & SQL Injection Vulnerability

2007.12.11
Credit: Doz
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-89

[HSC] Bitweaver XSS & SQL Injection Vulnerability Bitweaver is an open source content management system. Its speed and power are ideal for large-scale community websites and corporate applications, but it is simple enough for non-technical small site users to set up and administrate. It comes fully featured on install but is easy to extend. Hackers Center Security Group (http://www.hackerscenter.com) Credit: DoZ Risk: Medium Class: Cross-Site Scripting & SQL Vendor: http://www.bitweaver.org/ Product: Bitweaver Version: 2.0.0 & Previous Examples: /users/register.php/XSS /search/index.php/XSS /users/login.php?error=XSS Persistent XSS: If comments are allowed, attackers can use this url /wiki/index.php?page_id=1#editcomments to POST evil scripts and PHP code<http://www.hackerscenter.com/archive/view.asp?id=28129#>into the page. Sanitizing the input will prevent intrusion. Also we see that on forums there is the same issue: (NEED TO SANITIZE THE INPUT) /forums/index.php?t=1&post_comment_reply_id=1&post_comment_request=1#editcomments White Screen of Death: (SQL Injection) Critical information is listed o nthis page when you inject evil code. Some work if you inject JavaScript Code into the Search box and some show this page by following url: /wiki/list_pages.php?sort_mode=' By Search: /search/index.php?tk=316dccdfb62a3cad613e&highlight=[SQL_INJECTION]=&search=go Google Dork: Powered by bitweaver


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2021, cxsecurity.com

 

Back to Top