x10 Adult Media Script - Persistent Web Vulnerabilities

Type vulnerlab
Reporter Vulnerability Research Laboratory - Chokri B.A. (Meister)
Modified 2011-10-31T00:00:00


                                            Document Title:
x10 Adult Media Script - Persistent Web Vulnerabilities

References (Source):

Release Date:

Vulnerability Laboratory ID (VL-ID):

Product & Service Introduction:
Adult Media Script is an easy to use, easy to navigate, adult video script loaded with features! 
After ordering you can have your site up and running in minutes. 

(Copy of the Vendor Homepage: http://www.x10media.com/products-and-scripts/php-scripts/adult-media-script)

Abstract Advisory Information:
The vulnerability-lab researcher (Meister) discovered multiple persistent remote vulnerabilities on the x10 Adult Media script cms.

Vulnerability Disclosure Timeline:
2011-11-01:	Public or Non-Public Disclosure

Discovery Status:

Affected Product(s):

Exploitation Technique:

Severity Level:

Technical Details & Description:
Multiple persistent cross site scripting vulnerabilities are detected on the x10 Adult Media Script.
The bugs allows an remote attacker to inplement malicious persistent script codes on main modules of the software.
The successful exploitation of the vulnerability allows a remote attacker to hijack 
users and admins sessions, manipulate profile content requests, redirect to external targets(websites) & can 
lead to malware infiltration.

Vulnerable Module(s):
				                        [+] Submit video - Title/Description
			                        	[+] Admin panel  - Videos - Title/Description
			                        	[+] Admin panel  - Settings - Advertisements


Proof of Concept (PoC):
The vulnerabilities can be exploited by remote attackers. For demonstration or reproduce ...

Code Review: [Index]
<td height="91" valign="bottom" class="topad"><script type="text/javascript" src="http://syndication.exoclick.com/ads.php?type=
<noscript>Your browser does not support JavaScript. Update it for a better user experience.</noscript>
<script>alert("Hi rm !");</script></td>

1 - Add a new video
2 - Add your Javascript code in the name or the comments field [ example : "><script>alert("Vuln-Lab-persistant-xss");</script> ]
3 - You can also add the malicious code in the adsense field ( in the admin panel ) and it will affect all the visitors.

Security Risk:
The security risk of the remote cross site scripting vulnerabilities are estimated as high because of the persistent attack vector.

Credits & Authors:
Vulnerability Research Laboratory -  Chokri B.A. (Meister)

Disclaimer & Information:
The information provided in this advisory is provided as it is without any warranty. Vulnerability-Lab disclaims all warranties, 
either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-
Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business 
profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some 
states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation 
may not apply. We do not approve or encourage anybody to break any vendor licenses, policies, deface websites, hack into databases 
or trade with fraud/stolen material.

Domains:    www.vulnerability-lab.com   	- www.vuln-lab.com			       - www.vulnerability-lab.com/register
Contact:    admin@vulnerability-lab.com 	- support@vulnerability-lab.com 	       - research@vulnerability-lab.com
Section:    video.vulnerability-lab.com 	- forum.vulnerability-lab.com 		       - news.vulnerability-lab.com
Social:	    twitter.com/#!/vuln_lab 		- facebook.com/VulnerabilityLab 	       - youtube.com/user/vulnerability0lab
Feeds:	    vulnerability-lab.com/rss/rss.php	- vulnerability-lab.com/rss/rss_upcoming.php   - vulnerability-lab.com/rss/rss_news.php

Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. 
Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other 
media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, sourcecode, videos and 
other information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list (feed), 
modify, use or edit our material contact (admin@vulnerability-lab.com or support@vulnerability-lab.com) to get a permission.

    				   	Copyright © 2012 | Vulnerability Laboratory