Constructr CMS 3.03 Multiple Remote Vulnerabilities (XSS/SQLi)

2011-03-11T00:00:00
ID ZSL-2011-5001
Type zeroscience
Reporter Gjoko Krstic
Modified 2011-03-11T00:00:00

Description

Title: Constructr CMS 3.03 Multiple Remote Vulnerabilities (XSS/SQLi)
Advisory ID: ZSL-2011-5001
Type: Remote
Impact: Cross-Site Scripting, System Access, Exposure of System Information, Exposure of Sensitive Information, Manipulation of Data
Risk: (3/5)
Release Date: 11.03.2011

Summary

ConstructrCMS is a new and fresh Content Management System build with the Power of PHP and MySQL. The Backend is mostly controlled by Ajax for a unique User Experience.

Description

The CMS suffers from several vulnerabilities (SQL and XSS). The sql issue can be triggered when the app tries to parse malicious arguments to the 'page_id' in the /xmlOutput/constructrXmlOutput.content.xml.php script with user input not validated. The result can be seen in the source code of the page itself. The xss issue (GET) is thru 'user' and 'hash' parameter in the /backend/login.php script.

--------------------------------------------------------------------------------

32: $PAGE_ID = $_REQUEST['page_id']; ... 40: $select_content = $conContent -> query(" 41: SELECT * 42: FROM $DB_TABLE_CONSTRUCTR_CONTENT 43: WHERE page_id = '$PAGE_ID' 44: ORDER BY sort ASC 45: ")or die(mysql_error()); ... 51: while ($all_content = $conContent -> fetch_array($select_content)) 52: { 53: $id = $all_content['id']; 54: $page_id = $all_content['page_id'];
--------------------------------------------------------------------------------

Vendor

phaziz interface design - <http://www.constructr-cms.org>

Affected Version

3.03.0

Tested On

Tested on: Microsoft Windows XP Professional SP3 (EN)
Apache 2.2.14 (Win32)
PHP 5.3.1
MySQL 5.1.41

Vendor Status

N/A

PoC

constructr_sqlxss.txt

Credits

Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>

References

[1] <http://www.exploit-db.com/exploits/16963/>
[2] <http://packetstormsecurity.org/files/99204>
[3] <http://securityreason.com/wlb_show/WLB-2011030049>
[4] <http://www.securityfocus.com/bid/46842>
[5] <http://secunia.com/advisories/43743/>
[6] <http://osvdb.org/show/osvdb/71113>
[7] <http://osvdb.org/show/osvdb/71114>

Changelog

[11.03.2011] - Initial release
[12.03.2011] - Added reference [1], [2] and [3]
[13.03.2011] - Added reference [4]
[14.03.2011] - Added reference [5]
[15.03.2011] - Added reference [6] and [7]

Contact

Zero Science Lab

Web: <http://www.zeroscience.mk>
e-mail: lab@zeroscience.mk

                                        
                                            &lt;html&gt;&lt;head&gt;&lt;title&gt;403 Nothing to see.&lt;/title&gt;
&lt;link rel="Shortcut Icon" href="favicon.ico" type="image/x-icon"&gt;
&lt;style type="text/css"&gt;
&lt;!--
body {
	background-color: #000;
}
body,td,th {
	font-family: Verdana, Geneva, sans-serif;
}
a:link {
	color: #008FEF;
	text-decoration: none;
}
a:visited {
	color: #008FEF;
	text-decoration: none;
}
a:hover {
	text-decoration: underline;
	color: #666;
}
a:active {
	text-decoration: none;
}
--&gt;
&lt;/style&gt;
&lt;/head&gt;
&lt;body bgcolor=black&gt;
&lt;center&gt;
&lt;font color="#7E88A3" size="2"&gt;
&lt;br /&gt;&lt;br /&gt;
&lt;h1&gt;403 Nothing to see.&lt;/h1&gt;

You do not have the powah for this request /403.shtml&lt;br /&gt;&lt;br /&gt;
&lt;font size="2"&gt;&lt;a href="https://www.zeroscience.mk"&gt;https://www.zeroscience.mk&lt;/a&gt;&lt;/font&gt;
&lt;/font&gt;&lt;/center&gt;
&lt;/body&gt;&lt;/html&gt;