GeniXCMS 0.0.3 Cross Site Scripting

2015.06.24
Credit: John Page
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79

[+] Credits: John Page ( hyp3rlinx ) [+] Domains: hyp3rlinx.altervista.org [+] Source: http://hyp3rlinx.altervista.org/advisories/AS-GENIXCMS0621.txt Vendor: ============================================= genixcms.org Product: ===================================================== GeniXCMS v0.0.3 is a PHP based content management system Advisory Information: =================================================== Multiple persistent & reflected XSS vulnerabilities Vulnerability Details: ========================================================= GeniXCMS v0.0.3 is vulnerable to persistent and reflected XSS XSS Exploit code(s): ==================== Persistent XSS: ----------------------- http://localhost/GeniXCMS-master/GeniXCMS-master/gxadmin/index.php?page=posts&act=add&token= 1-content input field content injected XSS will execute after posting is published 2-title input field title injected XSS will execute immediate. Relected XSS: --------------------- http://localhost/GeniXCMS-master/GeniXCMS-master/gxadmin/index.php?page=posts&q=1'<script>alert('XSS By Hyp3rlinx')</script> Disclosure Timeline: ========================================================= Vendor Notification: NA June 21, 2015 : Public Disclosure Severity Level: ========================================================= Med Description: ========================================================= Request Method(s): [+] GET & POST Vulnerable Product: [+] GeniXCMS 0.0.3 Vulnerable Parameter(s): [+] q, content & title Affected Area(s): [+] index.php =============================================================== [+] Disclaimer Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and prohibits any malicious use of all security related information or exploits by the author or elsewhere. (hyp3rlinx)

References:

http://hyp3rlinx.altervista.org/advisories/AS-GENIXCMS0621.txt


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top