[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Seo Panel 3.4.0 Cross Site Scripting Vulnerability

Author
High-Tech Bridge
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-22264
Category
web applications
Date add
19-05-2014
CVE
CVE-2014-1855
Platform
php
Product: Seo Panel
Vendor: www.seopanel.in
Vulnerable Version(s): 3.4.0 and probably prior
Tested Version: 3.4.0
Advisory Publication:  January 29, 2014  [without technical details]
Vendor Notification: January 29, 2014 
Vendor Patch: May 15, 2014 
Public Disclosure: May 16, 2014 
Vulnerability Type: Cross-Site Scripting [CWE-79]
CVE Reference: CVE-2014-1855
Risk Level: Medium 
CVSSv2 Base Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
Solution Status: Fixed by Vendor
Discovered and Provided: High-Tech Bridge Security Research Lab ( https://www.htbridge.com/advisory/ ) 

-----------------------------------------------------------------------------------------------

Advisory Details:

High-Tech Bridge Security Research Lab discovered two vulnerabilities in Seo Panel, which can be exploited to perform Cross-Site Scripting (XSS) attacks agains users of the vulnerable application to steal their sensitive data.


1) Two Cross-Site Scripting (XSS) in Seo Panel: CVE-2014-1855


1.1 The vulnerability exists due to insufficient sanitisation of user-supplied data in "capcheck" HTTP GET parameter passed to "/directories.php" script. A remote attacker can trick a logged-in user to open a specially crafted link and execute arbitrary HTML and script code in browser in context of the vulnerable website.

The exploitation example below uses the "alert()" JavaScript function to display "immuniweb" word:

http://[host]/directories.php?capcheck=1%22%20onmouseover%3dalert%28%22immuniweb%22%29;%20%22&dir_name=&google_pagerank=&langcode=&pageno=8&sec=directorymgr&stscheck=1


1.2 The vulnerability exists due to insufficient sanitisation of user-supplied data in "keyword" HTTP GET parameter passed to "/proxy.php" script. A remote attacker can trick a logged-in user to open a specially crafted link and execute arbitrary HTML and script code in browser in context of the vulnerable website.

The exploitation example below uses the "alert()" JavaScript function to display "immuniweb" word:

http://[host]/proxy.php?keyword=1%22%20onmouseover%3dalert%28%22immuniweb%22%29;%20%22&status=active


-----------------------------------------------------------------------------------------------

Solution:

Update to Seo Panel 3.5.0

More Information:
http://forum.seopanel.in/viewtopic.php?f=7&t=10978

#  0day.today [2024-12-26]  #