what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

SocialCMS 1.0.2 Cross Site Scripting

SocialCMS 1.0.2 Cross Site Scripting
Posted Mar 30, 2012
Authored by Ivano Binetti

SocialCMS versions 1.0.2 and below suffer from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
advisories | CVE-2012-1982
SHA-256 | a66d3ebbdf0a5c8fec0b050c9acc1528e7708bd7acc201da83ebb71d1a25f4df

SocialCMS 1.0.2 Cross Site Scripting

Change Mirror Download
+------------------------------------------------------------------------------------------------------------------------------------+
# Exploit Title : SocialCMS <= 1.0.2 XSS (Persistent and Reflected) Vulnerabilities
# Date : 30-03-2012
# Author : Ivano Binetti (http://www.ivanobinetti.com)
# Vendor site : http://socialcms.com
# Software link : http://sourceforge.net/projects/socialcms/files/latest/download
# Version : 1.0.2 (and lower)
# Tested on : Debian Squeeze (6.0)
# CVE : CVE-2012-1982
# Original Advisory : http://www.webapp-security.com/2012/03/socialcms/
+------------------------------------------------------------------------------------------------------------------------------------+
Summary-
1)Introduction
2)Vulnerability Description
2.1 Persistent XSS
2.2 Reflected XSS
3)Exploit
+------------------------------------------------------------------------------------------------------------------------------------+
1)Introduction
SocialCMS "is online software for developing dynamic websites.It allows non-technical users to create and make changes to a
website easily. It can be used for setting up Company Website, Blog, Video site, Amazon shop, Membership Site, Adsense Site,
Affiliate Review site, Twitter CMS or for Domain Monetization etc.".

2)Vulnerability Description
2.1 Persistent XSS
SocialCMS 1.0.2 (and lower) is prone to a persistent XSS vulnerability due to an improper input sanitization of
"TR_title" parameter, passed to "my_admin/admin1_list_pages.php" via http POST method.
Exploiting this vulnerability an authenticated user - which is able to publish an article - could insert arbitrary
code in web management interface "Title" field - under "my_admin/admin1_list_pages.php?id=<page_id>&action=edit" - that will be
executed when an administrator - or another user - will browse that web page.

2.2 Reflected XSS
The Improper input sanitization of "TR_title" parameter causes also a Reflected XSS for the user which inserts html/javascript
code.


3)Exploit
Insert the following code in "Title" field when you're creating a new page:
"><script>alert(document.cookie)</script>
+-----------------------------------------------------------------------------------------------------------------------------------+
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close