0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
TransLucid 1.75 Multiple Remote Vulnerabilities
=============================================== TransLucid 1.75 Multiple Remote Vulnerabilities =============================================== transLucid - Cross Site Scripting and HTML Injection Vulnerabilities Version Affected: 1.75 (newest) Info: transLucidonline is the easy website publishing system with which anyone can create and maintain web content, in multiple languages and based on a growing list of ready-made, professional layouts. Credits: InterN0T (macd3v and MaXe) External Links: http://www.pantha.net/ -:: The Advisory ::- Vulnerable Function / ID Calls: NodeID & action (vulnerable in both admin and public panels) Cross Site Scripting: (anyone - this was tested with public mode on) 1) http://[HOST]/translucid/transLucid_175/?NodeID="><script>alert(0)</script> 2) http://[HOST]/translucid/transLucid_175/?action="><script>alert(0)</script> (found by macd3v) 3) http://[HOST]/translucid/transLucid_175/?admin_section=1&NodeID="><script>alert(0)</script> -- Number 3 might require moderator or administrative access if public mode is not turned on. HTML Injection: - If public mode is on / chosen, editing the following page-fields will result in script execution: Title & Url Adding a new page can result in HTML Injection too. (Parent & Child pages were fully tested.) Affected Sites by HTML Injection: (there will most likely be a lot more.) http://[HOST]/translucid/transLucid_175/?action=switchto_editmode -- In the admin panel "> needs to be prepended most likely in order to execute the injection. --=-- Switching the theme to Developer can result in HTML Injection if there is any injected. -:: Solution ::- Regular expression match and / or bad characters conversion rocks! Conclusion: Easy to install and use, but the code should have been reviewed long ago. Reference: http://forum.intern0t.net/intern0t-advisories/1122-intern0t-translucid-1-75-multiple-vulnerabilities.html Disclosure Information: - Vulnerabilities found, researched and confirmed between 5th to 10th June. - Advisory finished and published on InterN0T the 12th June. - Vendor and Buqtraq (SecurityFocus) contacted the 12th June. All of the best, MaXe # 0day.today [2024-10-06] #