0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Wolf CMS 0.7.5 Cross Site Scripting / SQL Injection
Title: ====== Wolf CMS 0.7.5 Cross Site Scripting / SQL Injection Date: ===== 2012-02-27 Introduction: ============= Wolf CMS is a content management system and is Free Software published under the GNU General Public License v3. Wolf CMS is written in the PHP programming language. Wolf CMS is a fork of Frog CMS. The project was a finalistin the 2010 Packt Publishing s Open Source awards for the Most Promising Open Source Project category. As of the 28th of December 2010, the Wolf CMS code repository was moved from Google Code to Github. ( Copy of the Vendor Homepage: http://en.wikipedia.org/wiki/Wolf_CMS ) Abstract: ========= Vulnerability Laboratory Research Team discovered multiple Web Vulnerabilities on the Wolf Content Management System v0.7.5 Report-Timeline: ================ 2012-02-11: Vendor Notification 2012-02-27: Public or Non-Public Disclosure Affected Products: ================== BlueWin CH Product: Wolf CMS v0.7.5 Details: ======== 1.1 A SQL Injection vulnerability is detected on the Wolfs Content Management System v0.7.5. The vulnerability allows an remote attacker to execute own sql commands on the affected application dbms. Successful exploitation can result in dbms, web-server or application compromise. Vulnerable Module(s): [+] /plugins/comment/[Index] 1.2 Multiple persistent vulnerabilities are detected on the Wolfs Content Management System v0.7.5. The bug allows an remote attacker or local low privileged user account to inject persistent malicious script code on application side. Successful exploitation can result in persistent context manipulation on requests, session hijacking & account steal via application side phishing. Vulnerable Module(s): [+] /plugins/comment/ Proof of Concept: ================= The vulnerabilities can be exploited by remote attackers & local low privileged user accounts with- and without required user inter action. For demonstration or reproduce ... 1.1 Path: /wolfcms/wolf/plugins/comment/ File: index.php Review: 271: $ip = isset($_SERVER['HTTP_X_FORWARDED_FOR']) ? $_SERVER['HTTP_X_FORWARDED_FOR']:($_SERVER['REMOTE_ADDR']); 1.2 Path: /wolfcms/wolf/plugins/comment/ File: index.php Review: /wolfcms/wolf/plugins/comment/index.php 272: echo '<input type="hidden" value="'.$ip.'" name="comment[author_ip]" />'; Risk: ===== 1.1 The security risk of the blind sql injection vulnerabilities are estimated as high(+). 1.2 The security risk of the persistant xss vulnerabilities are estimated as medium(+). # 0day.today [2024-12-23] #