SocialCMS 1.0.2 Cross Site Scripting

2012-03-30T00:00:00
ID PACKETSTORM:111409
Type packetstorm
Reporter Ivano Binetti
Modified 2012-03-30T00:00:00

Description

                                        
                                            `+------------------------------------------------------------------------------------------------------------------------------------+  
# Exploit Title : SocialCMS <= 1.0.2 XSS (Persistent and Reflected) Vulnerabilities  
# Date : 30-03-2012  
# Author : Ivano Binetti (http://www.ivanobinetti.com)  
# Vendor site : http://socialcms.com  
# Software link : http://sourceforge.net/projects/socialcms/files/latest/download  
# Version : 1.0.2 (and lower)  
# Tested on : Debian Squeeze (6.0)   
# CVE : CVE-2012-1982  
# Original Advisory : http://www.webapp-security.com/2012/03/socialcms/  
+------------------------------------------------------------------------------------------------------------------------------------+  
Summary-  
1)Introduction  
2)Vulnerability Description  
2.1 Persistent XSS  
2.2 Reflected XSS  
3)Exploit  
+------------------------------------------------------------------------------------------------------------------------------------+  
1)Introduction  
SocialCMS "is online software for developing dynamic websites.It allows non-technical users to create and make changes to a   
website easily. It can be used for setting up Company Website, Blog, Video site, Amazon shop, Membership Site, Adsense Site,   
Affiliate Review site, Twitter CMS or for Domain Monetization etc.".  
  
2)Vulnerability Description  
2.1 Persistent XSS  
SocialCMS 1.0.2 (and lower) is prone to a persistent XSS vulnerability due to an improper input sanitization of   
"TR_title" parameter, passed to "my_admin/admin1_list_pages.php" via http POST method.   
Exploiting this vulnerability an authenticated user - which is able to publish an article - could insert arbitrary   
code in web management interface "Title" field - under "my_admin/admin1_list_pages.php?id=<page_id>&action=edit" - that will be   
executed when an administrator - or another user - will browse that web page.  
  
2.2 Reflected XSS  
The Improper input sanitization of "TR_title" parameter causes also a Reflected XSS for the user which inserts html/javascript   
code.   
  
  
3)Exploit   
Insert the following code in "Title" field when you're creating a new page:  
"><script>alert(document.cookie)</script>  
+-----------------------------------------------------------------------------------------------------------------------------------+  
`