ATutor 1.0 Cross Site Scripting

2010-09-16T00:00:00
ID PACKETSTORM:93901
Type packetstorm
Reporter High-Tech Bridge SA
Modified 2010-09-16T00:00:00

Description

                                        
                                            `======================================  
Vulnerability ID: HTB22599  
Reference: http://www.htbridge.ch/advisory/xss_vulnerability_in_atutor_edit_content_folder.html  
Product: ATutor  
Vendor: Inclusive Design Institute ( http://www.atutor.ca/ )   
Vulnerable Version: 1.0  
Vendor Notification: 01 September 2010   
Vulnerability Type: XSS (Cross Site Scripting)  
Status: Not Fixed, Vendor Alerted, Awaiting Vendor Response  
Risk level: Medium   
Credit: High-Tech Bridge SA - Ethical Hacking & Penetration Testing (http://www.htbridge.ch/)   
  
Vulnerability Details:  
User can execute arbitrary JavaScript code within the vulnerable application.  
  
The vulnerability exists due to failure in the "/mods/_core/editor/edit_content_folder.php" script to properly sanitize user-supplied input in "cid" variable. Successful exploitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data.  
  
An attacker can use browser to exploit this vulnerability. The following PoC is available:  
http://host/mods/_core/editor/edit_content_folder.php?cid=PAGE_ID"><script>alert(document.cookie)</script>  
  
======================================  
Vulnerability ID: HTB22600  
Reference: http://www.htbridge.ch/advisory/xss_vulnerability_in_atutor_1.html  
Product: ATutor  
Vendor: Inclusive Design Institute ( http://www.atutor.ca/ )   
Vulnerable Version: 1.0  
Vendor Notification: 01 September 2010   
Vulnerability Type: XSS (Cross Site Scripting)  
Status: Not Fixed, Vendor Alerted, Awaiting Vendor Response  
Risk level: Low   
Credit: High-Tech Bridge SA - Ethical Hacking & Penetration Testing (http://www.htbridge.ch/)   
  
Vulnerability Details:  
User can execute arbitrary JavaScript code within the vulnerable application.  
  
The vulnerability exists due to failure in the "/mods/_core/editor/delete_content.php" script to properly sanitize user-supplied input in "cid" variable. Successful exploitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data.  
  
An attacker can use browser to exploit this vulnerability. The following PoC is available:  
http://host/mods/_core/editor/delete_content.php?cid=PAGE_ID"><script>alert(document.cookie)</script>  
  
`