Bitweaver XSS & SQL Injection Vulnerability

Credit: Doz
Risk: Medium
Local: No
Remote: Yes

[HSC] Bitweaver XSS & SQL Injection Vulnerability Bitweaver is an open source content management system. Its speed and power are ideal for large-scale community websites and corporate applications, but it is simple enough for non-technical small site users to set up and administrate. It comes fully featured on install but is easy to extend. Hackers Center Security Group ( Credit: DoZ Risk: Medium Class: Cross-Site Scripting & SQL Vendor: Product: Bitweaver Version: 2.0.0 & Previous Examples: /users/register.php/XSS /search/index.php/XSS /users/login.php?error=XSS Persistent XSS: If comments are allowed, attackers can use this url /wiki/index.php?page_id=1#editcomments to POST evil scripts and PHP code<>into the page. Sanitizing the input will prevent intrusion. Also we see that on forums there is the same issue: (NEED TO SANITIZE THE INPUT) /forums/index.php?t=1&post_comment_reply_id=1&post_comment_request=1#editcomments White Screen of Death: (SQL Injection) Critical information is listed o nthis page when you inject evil code. Some work if you inject JavaScript Code into the Search box and some show this page by following url: /wiki/list_pages.php?sort_mode=' By Search: /search/index.php?tk=316dccdfb62a3cad613e&highlight=[SQL_INJECTION]=&search=go Google Dork: Powered by bitweaver

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2021,


Back to Top