transLucid - Cross Site Scripting and HTML Injection Vulnerabilities
Version Affected: 1.75 (newest)
Info: transLucidonline is the easy website publishing system with which anyone can create and
maintain web content, in multiple languages and based on a growing list of ready-made, professional
layouts.
Credits: InterN0T (macd3v and MaXe)
External Links:
http://www.pantha.net/
-:: The Advisory ::-
Vulnerable Function / ID Calls:
NodeID & action (vulnerable in both admin and public panels)
Cross Site Scripting: (anyone - this was tested with public mode on)
1) http://[HOST]/translucid/transLucid_175/?NodeID="><script>alert(0)</script>
2) http://[HOST]/translucid/transLucid_175/?action="><script>alert(0)</script> (found by macd3v)
3) http://[HOST]/translucid/transLucid_175/?admin_section=1&NodeID="><script>alert(0)</script>
– Number 3 might require moderator or administrative access if public mode is not turned on.
HTML Injection:
Adding a new page can result in HTML Injection too. (Parent & Child pages were fully tested.)
Affected Sites by HTML Injection: (there will most likely be a lot more.)
http://[HOST]/translucid/transLucid_175/?action=switchto_editmode
– In the admin panel "> needs to be prepended most likely in order to execute the injection.
–=-- Switching the theme to Developer can result in HTML Injection if there is any injected.
-:: Solution ::-
Regular expression match and / or bad characters conversion rocks!
Conclusion:
Easy to install and use, but the code should have been reviewed long ago.
Disclosure Information:
All of the best,
MaXe