Friday, 30 March 2012
[EN] eXtreme-fusion 4.5 - XSS'ed "by design"
[ TITLE ....... ][ 'Redirect to XSS' in eXtreme-fusion 4.5
[ DATE ........ ][ 27.03.2012
[ AUTOHR ...... ][ http://hauntit.blogspot.com
[ SOFT LINK ... ][ http://www.extreme-fusion.pl/
[ VERSION ..... ][ 4.5
[ TESTED ON ... ][ LAMP
[ ----------------------------------------------------------------------- [
[ 1. What is this?
[ 2. What is the type of vulnerability?
[ 3. Where is bug :)
[ 4. More...
[--------------------------------------------[
[ 1. What is this?
This is very nice CMS, You should try it! ;)
[--------------------------------------------[
[ 2. What is the type of vulnerability?
This CMS has builded-in 'redirect' parameter.
We can use this to redirect user to site with XSS/PHP payload.
I think this ('redirect' parameter) should be protected to some 'localhost'/'local-webapp'
access only. Anyway, nice code :)
[--------------------------------------------[
[ 3. Where is bug :)
$redirect parameter in 'login panel'.
This can be used to scan remote server too :)
If You want scanner, mail me.
[--------------------------------------------[
[ 4. More...
- http://www.extreme-fusion.pl/
- http://hauntit.blogspot.com
- http://www.google.com
- http://portswigger.net
[
[--------------------------------------------[
[ All questions about new projects @ mail now :)
]
[ Best regards
[
Labels:
0day,
exploit,
research,
vulnerability
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
What do You think...?