Croogo CMS 1.2 Cross Site Scripting Vulnerabilities

Croogo CMS 1.2 Cross Site Scripting Vulnerabilities

Posted on Feb 27 2010   |  Plain text version

Summary

Croogo CMS 1.2 Cross Site Scripting Vulnerabilities

Description

Vulnerable Software: 1.2 and prior
Release Date:     2010-02-31
Last Update:     2010-02-01
Critical:     Low
Impact:     Session hijack
        Denial of service
        Code execution

Solution Status:    Webvuln has informed and submitted a patch to the vendor
            Croogo 1.2.1 has been released
Websec Advisory:    ws10-07


  BACKGROUND
=======================

Croogo is a content management system gaining popularity rapidily in the CAKEPHP community. Its 'Contact' module allow the users to save the
messages and due to lack of input sanitation is vulnerable to cross site scripting attacks.


   DESCRIPTION
=======================

The 'Contact' module allows their users to save the received messages to the database. The vulnerabilities are present because the fields 'title' and
'subject' are not sanitized at all.



    EXPLOIT / POC
=======================

An attacker can exploit this vulnerability simply by sending the malicious code using the fields 'subject' or 'title' located in the contact form.

  WORKAROUND
=======================

Upgrade to Croogo 1.2.1 or download the latest copy of 'contacts_controller.php' on Croogo's public repository


   DISCLOSURE TIMELINE
=======================

2009/01/15 - Vulnerability discovered
2009/01/20 - Vendor contacted
2009/01/30 - Patch submitted to Croogo's public source code repositories
2010/01/31 - Patch merged with main branch
2009/03/06 - Vulnerability disclosed


    REFERENCES
=======================
Croogo CMS - http://www.croogo.org/

WebVuln - http://www.webvuln.com

POC


Latest Blog Entries

Downloading an Application's Entire Source Code Through an Exposed GIT Directory
Website administrators sometimes inadvertently leave an exposed .git directory, from which it is possible to download the entire source code of the web application using just wget and a common server misconfiguration.

credmap: The Credential Mapper
An overview of credmap, an open source penetration testing tool that automates the process of testing for credential reuse. It does so by testing supplied user credentials on known websites and verifies if the password has been reused on any of these.

New publication: Mastering the Nmap Scripting Engine
We invite you to learn more about the latest publication from our team, "Mastering the Nmap Scripting Engine".

Latest News

Blackhat EU 2015
Websec participated with two tools at the Blackhat, EU Arsenal held in Amsterdam, NL from the 10-13 of November, 2015. During this event, we introduced our brand new tool "credmap: The Credential Mapper" and also presented an amped-up version of Panoptic.

BSides Vancouver 2015
Websec is proud to announce that we will be attending the 3rd annual edition of BSides Vancouver, a local non-profit information security conference held in the heart of Vancouver, BC on March 16 and 17.