Document Title: =============== KWSPHP CMS v1.6.995 - Persistent Cross Site Scripting Web Vulnerability References (Source): ==================== http://ift.tt/295dIdj Release Date: ============= 2016-07-01 Vulnerability Laboratory ID (VL-ID): ==================================== 1867 Common Vulnerability Scoring System: ==================================== 3.5 Product & Service Introduction: =============================== KwsPHP fully configurable Site. Our links and official banners. KwsPHP is a CMS (Content Management System or content management system). Discover its major assets as of the installation: an installation of ease via an ergonomic interface, simple and intuitive. You are guided step by step through the installation to find yourself before a true virgin website, ready to be filled according to your wishes. To change your site and add items Space member KwsPHP offers a full range of functions and topics. (Copy of the Vendor Homepage: http://www.kwsphp.org/ ) Abstract Advisory Information: ============================== An independent vulnerability laboratory researcher discovered an application-side vulnerability in the official KWSPHP v1.6.995 content management system. Vulnerability Disclosure Timeline: ================================== 2016-07-01: Public Disclosure (Vulnerability Laboratory) Discovery Status: ================= Published Affected Product(s): ==================== KwsPHP Ltd Product: KwsPHP - Content Management System (Web-Application) 1.6.995 Exploitation Technique: ======================= Remote Severity Level: =============== Medium Technical Details & Description: ================================ A persistent cross site scripting web vulnerability has been discoverd in the official KWSPHP v1.6.995 content management system. The security issue allows remote attackers to inject own malicious script codes on the application-side of the affected service module. The vulnerability is located in the `sql_contact_pseudo` parameter of the `index.php` file within the contact module. Remote attackers and low privileged web-application user accounts are able to inject own malicious script code context as `contact pseudonym` value of the index.php file POST method request. The injection point is the vulnerable contact formular and the execution occurs in the same formular context after the submit POST method request is perfomed. Not only the form itself is wrong encoded, the email that is get send to the contact will be encoded as html which results in a second point of execution. The main issue occurs in the contact formular itself. The security risk of the persistent validation vulnerability is estimated as medium with a cvss (common vulnerability scoring system) count of 3.5. Exploitation of the persistent input validation web vulnerability requires no privileged web-application user account and low or medium user interaction. Successful exploitation of the vulnerability results in session hijacking, persistent phishing, persistent external redirects to malicious source and persistent manipulation of affected or connected application modules. Request Method(s): [+] POST Vulnerable Module(s): [+] Contact Formular Vulnerable File(s): [+] index.php Vulnerable Parameter(s): [+] sql_contact_pseudo Affected Module(s): [+] Contact Formular [+] Email Notify Proof of Concept (PoC): ======================= The persistent input validation web vulnerability can be exploited by remote attackers without privileged user account and with low user interaction. For security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue.
Source: Gmail -> IFTTT-> Blogger
No comments:
Post a Comment