Bitweaver XSS & SQL Injection Vulnerability

2007.12.17
Credit: DoZ
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-89


CVSS Base Score: 6.8/10
Impact Subscore: 6.4/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

[HSC] Bitweaver XSS & SQL Injection Vulnerability Bitweaver is an open source content management system. Its speed and power are ideal for large-scale community websites and corporate applications, but it is simple enough for non-technical small site users to set up and administrate. It comes fully featured on install but is easy to extend. Hackers Center Security Group (http://www.hackerscenter.com) Credit: DoZ Risk: Medium Class: Cross-Site Scripting & SQL Vendor: http://www.bitweaver.org/ Product: Bitweaver Version: 2.0.0 & Previous Examples: /users/register.php/XSS /search/index.php/XSS /users/login.php?error=XSS Persistent XSS: If comments are allowed, attackers can use this url /wiki/index.php?page_id=1#editcomments to POST evil scripts and PHP code into the page. Sanitizing the input will prevent intrusion. Also we see that on forums there is the same issue: (NEED TO SANITIZE THE INPUT) /forums/index.php?t=1&post_comment_reply_id=1&post_comment_request=1#edi tcomments White Screen of Death: (SQL Injection) Critical information is listed o nthis page when you inject evil code. Some work if you inject JavaScript Code into the Search box and some show this page by following url: /wiki/list_pages.php?sort_mode=' By Search: /search/index.php?tk=316dccdfb62a3cad613e&highlight=[SQL_INJECTION]=&sea rch=go Google Dork: Powered by bitweaver Only becoming a Ethical Hacker, you can stop Black Hat Hackers. Learn with out having to pay thousands!- http://kit.hackerscenter.com - The most comprehensive security pack you will ever find on the net!


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top