{"openvas": [{"lastseen": "2019-05-29T18:33:51", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-7893", "CVE-2018-8058"], "description": "CMS Made Simple is prone to multiple Stored XSS Vulnerabilities.", "modified": "2018-10-26T00:00:00", "published": "2018-03-14T00:00:00", "id": "OPENVAS:1361412562310113132", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310113132", "type": "openvas", "title": "CMS Made Simple 2.2.6 Multiple Stored XSS VUlnerabilities", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_cms_made_simple_mult_xss_vuln.nasl 12116 2018-10-26 10:01:35Z mmartin $\n#\n# CMS Made Simple 2.2.6 Multiple Stored XSS Vulnerabilities\n#\n# Authors:\n# Jan Philipp Schulte <jan.schulte@greenbone.net>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, https://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License as published by\n# the Free Software Foundation; either version 2 of the License, or\n# (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif( description )\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.113132\");\n script_version(\"$Revision: 12116 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-26 12:01:35 +0200 (Fri, 26 Oct 2018) $\");\n script_tag(name:\"creation_date\", value:\"2018-03-14 10:38:33 +0100 (Wed, 14 Mar 2018)\");\n script_tag(name:\"cvss_base\", value:\"3.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:S/C:N/I:P/A:N\");\n\n script_tag(name:\"qod_type\", value:\"remote_banner\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_cve_id(\"CVE-2018-7893\", \"CVE-2018-8058\");\n\n script_name(\"CMS Made Simple 2.2.6 Multiple Stored XSS VUlnerabilities\");\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Web application abuses\");\n script_dependencies(\"cms_made_simple_detect.nasl\");\n script_mandatory_keys(\"cmsmadesimple/installed\");\n\n script_tag(name:\"summary\", value:\"CMS Made Simple is prone to multiple Stored XSS Vulnerabilities.\");\n script_tag(name:\"vuldetect\", value:\"The script checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"CMS Made Simple has stored XSS vulnerabilities in admin/moduleinterface.php via following parameters:\n\n - metadata\n\n - pagedata\");\n script_tag(name:\"impact\", value:\"Successful exploitation would allow an attacker to inject HTML or JavaScript into the website.\");\n script_tag(name:\"affected\", value:\"CMS Made Simple through version 2.2.6.\");\n script_tag(name:\"solution\", value:\"Update to version 2.2.7.\");\n\n script_xref(name:\"URL\", value:\"https://github.com/ibey0nd/CVE/blob/master/CMS%20Made%20Simple%20Stored%20XSS.md\");\n script_xref(name:\"URL\", value:\"https://github.com/ibey0nd/CVE/blob/master/CMS%20Made%20Simple%20Stored%20XSS%202.md\");\n\n exit(0);\n}\n\nCPE = \"cpe:/a:cmsmadesimple:cms_made_simple\";\n\ninclude( \"host_details.inc\" );\ninclude( \"version_func.inc\" );\n\nif( ! port = get_app_port( cpe: CPE ) ) exit( 0 );\nif( ! version = get_app_version( cpe: CPE, port: port ) ) exit( 0 );\n\nif( version_is_less_equal( version: version, test_version: \"2.2.6\" ) ) {\n report = report_fixed_ver( installed_version: version, fixed_version: \"2.2.7\" );\n security_message( data: report, port: port );\n exit( 0 );\n}\n\nexit( 99 );\n", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:N/I:P/A:N"}}]}