Exploit TransLucid 1.75 - Multiple Vulnerabilities

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
8943
Проверка EDB
  1. Пройдено
Автор
INTERN0T
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2009-2145
Дата публикации
2009-06-12
Код:
transLucid - Cross Site Scripting and HTML Injection Vulnerabilities

Version Affected: 1.75 (newest)

Info: transLucidonline is the easy website publishing system with which
anyone can create and maintain web content, in multiple languages and
based on a growing list of ready-made, professional layouts.

Credits: InterN0T (macd3v and MaXe)

External Links:
http://www.pantha.net/


-:: The Advisory ::-

Vulnerable Function / ID Calls:
NodeID & action (vulnerable in both admin and public panels)

Cross Site Scripting: (anyone - this was tested with public mode on)
1)
http://[HOST]/translucid/transLucid_175/?NodeID="><script>alert(0)</script>
2)
http://[HOST]/translucid/transLucid_175/?action="><script>alert(0)</script>
(found by macd3v)
3)
http://[HOST]/translucid/transLucid_175/?admin_section=1&NodeID="><script>alert(0)</script>
-- Number 3 might require moderator or administrative access if public
mode is not turned on.

HTML Injection:
- If public mode is on / chosen, editing the following page-fields will
result in script execution: Title & Url

Adding a new page can result in HTML Injection too. (Parent & Child
pages were fully tested.)

Affected Sites by HTML Injection: (there will most likely be a lot more.)
http://[HOST]/translucid/transLucid_175/?action=switchto_editmode
-- In the admin panel "> needs to be prepended most likely in order to
execute the injection.
--=-- Switching the theme to Developer can result in HTML Injection if
there is any injected.

-:: Solution ::-
Regular expression match and / or bad characters conversion rocks!

Conclusion:
Easy to install and use, but the code should have been reviewed long ago.

Reference:
http://forum.intern0t.net/intern0t-advisories/1122-intern0t-translucid-1-75-multiple-vulnerabilities.html

Disclosure Information:
- Vulnerabilities found, researched and confirmed between 5th to 10th June.
- Advisory finished and published on InterN0T the 12th June.
- Vendor and Buqtraq (SecurityFocus) contacted the 12th June.


All of the best,
MaXe

# milw0rm.com [2009-06-12]
 
Источник
www.exploit-db.com

Похожие темы