Friday, 30 March 2012

[EN] eXtreme-fusion 4.5 - XSS'ed "by design"


[ TITLE ....... ][ 'Redirect to XSS' in eXtreme-fusion 4.5
[ DATE ........ ][ 27.03.2012
[ AUTOHR ...... ][ http://hauntit.blogspot.com
[ SOFT LINK ... ][ http://www.extreme-fusion.pl/
[ VERSION ..... ][ 4.5
[ TESTED ON ... ][ LAMP
[ ----------------------------------------------------------------------- [

[ 1. What is this?
[ 2. What is the type of vulnerability?
[ 3. Where is bug :)
[ 4. More...

[--------------------------------------------[
[ 1. What is this?
This is very nice CMS, You should try it! ;)

[--------------------------------------------[
[ 2. What is the type of vulnerability?
This CMS has builded-in 'redirect' parameter.
We can use this to redirect user to site with XSS/PHP payload.
I think this ('redirect' parameter) should be protected to some 'localhost'/'local-webapp'
access only. Anyway, nice code :)

[--------------------------------------------[
[ 3. Where is bug :)
$redirect parameter in 'login panel'.

This can be used to scan remote server too :)
If You want scanner, mail me.

[--------------------------------------------[
[ 4. More...

- http://www.extreme-fusion.pl/
- http://hauntit.blogspot.com
- http://www.google.com
- http://portswigger.net
[
[--------------------------------------------[
[ All questions about new projects @ mail now :)
]
[ Best regards
[

No comments:

Post a Comment

What do You think...?