Lucene search

K
htbridgeHigh-Tech BridgeHTB23160
HistoryJun 12, 2013 - 12:00 a.m.

XSS Vulnerabilities in OpenCms

2013-06-1200:00:00
High-Tech Bridge
www.htbridge.com
24

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.002 Low

EPSS

Percentile

58.2%

High-Tech Bridge Security Research Lab discovered 2 XSS vulnerabilities in OpenCms, which can be exploited to perform Cross-Site Scripting attacks against users of vulnerable application.

  1. Multiple Cross-Site Scripting (XSS) in OpenCms: CVE-2013-4600
    1.1 The vulnerability exists due to insufficient sanitisation of user-supplied data in “title” HTTP GET parameter passed to “/opencms/opencms/system/workplace/views/admin/admin-main.jsp” script. A remote attacker can trick a logged-in administrator to open a specially crafted link and execute arbitrary HTML and script code in browser in context of the vulnerable website.
    The exploitation example below uses the “alert()” JavaScript function to display administrator’s cookies:
    http://[host]/opencms/opencms/system/workplace/views/admin/admin-main.jsp?ac tion=&dialogtype=publishproject&framename=body&title=%3Cscript%3Ealert%28doc ument.cookie%29;%3C/script%3E

1.2 The vulnerability exists due to insufficient sanitisation of user-supplied data in “requestedResource” HTTP POST parameter passed to “/opencms/opencms/system/login/index.html” URL. A remote attacker can trick a logged-in user to open a specially crafted malicious webpage and execute arbitrary HTML and script code in browser in context of the vulnerable website.
The exploitation example below uses the “alert()” JavaScript function to display user’s cookies:
<form action=“http://[host]/opencms/opencms/system/login/index.html” method=“post” name=“main”>
<input type=“hidden” name=“login” value=“true”>
<input type=“hidden” name=“ocPword” value=“1”>
<input type=“hidden” name=“ocUname” value=“1”>
<input type=“hidden” name=“requestedResource” value=‘</script><script>alert(document.cookie);</script>’>
<input type=“submit” id=“btn”>
</form>
<script>
document.main.submit();
</script>

CPENameOperatorVersion
opencmsle8.5.1

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.002 Low

EPSS

Percentile

58.2%