Skip to main content
Medium May 10, 2010

Croogo CMS 1.3 'Contact' and 'User' Module HTML Injection

Croogo CMS 1.3 fails to sanitize user-supplied input in the Contact and User modules, letting attackers inject HTML and JavaScript that runs in an administrator's browser and enables session theft or UI redressing.

CVSS Score

6.1 / 10.0

Severity

Medium

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Advisory

ApplicationCroogo CMS
Vulnerable Versions1.3
Fixed In1.3.1
Websec AdvisoryWS10-08

Description

Croogo CMS is prone to HTML injection because it fails to sanitize user-supplied input. Attacker-supplied markup and script code run in the context of the affected browser, allowing session theft, UI redressing, or other client-side attacks.

Exploit / Proof of Concept

Inject HTML or JavaScript through:

  • The name field in the user registration form (/users/add).
  • The data[Comment][body] field on the "add a comment" form (/comments/add/).

The comment body is sanitized on storage, but the Tipsy tooltip library re-decodes the stored string, re-introducing the injection in the admin panel.

Workaround

Upgrade to Croogo 1.3.1, or apply the patch Websec submitted to the Croogo public repository.

Remediation

Upgrade to Croogo 1.3.1.

Share this advisory:

Related Security Advisories

Stay informed about other recent vulnerabilities and security advisories

Critical December 18, 2014

Command Execution and Backdoor in Zhone GPON-2520

This post will describe a backdoor account found in the Zhone GPON-2520 and will provide a PoC which can be used to disable the firewall filtration rules in order to allow access to services such as ssh, telnet and ftp.

Severity:
CVSS: 9.8
View advisory
High May 22, 2014

Huawei HG8245 / HG8247 WPA Generator

Huawei HG8245 & HG8247 ONT (firmware version V1R006C00S100) rely on a weak algorithm to calculate the WPA keys, keys can be predicted easily using the WiFi's MAC Address (BSSID).

Severity:
CVSS: 7.4
View advisory
High December 19, 2013

Arbitrary Command Execution in Alcatel-Lucent I-240W-Q

The Alcatel-Lucent I-240W-Q ONT's Diagnostics page does not filter shell metacharacters in the IP address field, allowing any authenticated administrator to execute arbitrary commands as root and fully compromise the device.

Severity:
CVSS: 8.0
View advisory