Comsenz SupeSite CMS 7.0 Cross Site Scripting

Credit: Wang Jing
Risk: Low
Local: No
Remote: Yes

*Comsenz SupeSite CMS 7.0 Stored XSS (Cross-site Scripting) Security Vulnerabilities* Exploit Title: Comsenz SupeSite CMS 7.0 Stored XSS Security Vulnerabilities Product: Supesite CMS (Content Management System) Vendor: ComSenz Vulnerable Versions: 6.0.1UC 7.0 Tested Version: 7.0 Advisory Publication: April 15, 2015 Latest Update: April 15, 2015 Vulnerability Type: Cross-Site Scripting [CWE-79] CVE Reference: * Impact CVSS Severity (version 2.0): CVSS v2 Base Score: 7.5 (HIGH) (AV:N/AC:L/Au:N/C:P/I:P/A:P) (legend) Impact Subscore: 6.4 Exploitability Subscore: 10.0 Discover and Reporter: Wang Jing [Mathematics, Nanyang Technological University (NTU), Singapore] *Proposition Details:* *(1) Vendor & Product Description:* *Vendor:* Comsenz *Product & Vulnerable Versions:* SupeSite 6.0.1UC SupeSite 7.0 *Vendor URL & Download:* SupeSite can be brought from here, *Source code:* *Product Introduction Overview:* "SupeSite is an independent content management (CMS) function, and integrates Web2.0 community personal portal system X-Space, has a strong aggregation of community portal systems. SupeSite station can be achieved within the forum (Discuz!), personal space (X-Space) information content aggregation. Any webmaster , are available through SupeSite, easy to build a community portal for Web2.0." "Through grade audit operations, audit managers can publish information on the station to rank classification, shield, remove the handle, which can display information on the effective control of the site's pages. When the audit information, the audit level is set to shield information, the information will no longer appear on the page aggregation site, but the user's own personal space is still displayed above. If you want to completely shield the information, use the delete function. Audit information is divided into five levels, you can page polymerization conditions, freedom of information conducted classification. The default user information released pending state audit level. Administrators can set up the site, set whether to allow the pending status of the information displayed on the site aggregation page." *(2) Vulnerability Details:* SupeSite web application has a security bug problem. It can be exploited by stored XSS attacks. This may allow a remote attacker to create a specially crafted request that would execute arbitrary script code in a user's browser session within the trust relationship between their browser and the server. Several other SupeSite products 0-day vulnerabilities have been found by some other bug hunter researchers before. SupeSite has patched some of them. Exploit Archive provides sources for the latest info-sec news, tools, and advisories. It has published suggestions, advisories, solutions details related to XSS vulnerabilities. *(2.1)* The vulnerability occurs at article's title field. Supesite filter script code such as JavaScript. However, it doesn't filter VBScript. So a normal user can insert VBScript in an article he/she published. Everyone who visits this article will be affected by the XSS attack. *References:* -- Wang Jing, Division of Mathematical Sciences (MAS), School of Physical and Mathematical Sciences (SPMS), Nanyang Technological University (NTU), Singapore.


Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2023,


Back to Top