[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20071209193013.12035.qmail@securityfocus.com>
Date: 9 Dec 2007 19:30:13 -0000
From: DoZ@...kersCenter.com
To: bugtraq@...urityfocus.com
Subject: Bitweaver XSS & SQL Injection Vulnerability
[HSC] Bitweaver XSS & SQL Injection Vulnerability
Bitweaver is an open source content management system. Its speed and
power are ideal for large-scale community websites and corporate applications,
but it is simple enough for non-technical small site users to set up and
administrate. It comes fully featured on install but is easy to extend.
Hackers Center Security Group (http://www.hackerscenter.com)
Credit: DoZ
Risk: Medium
Class: Cross-Site Scripting & SQL
Vendor: http://www.bitweaver.org/
Product: Bitweaver
Version: 2.0.0 & Previous
Examples:
/users/register.php/XSS
/search/index.php/XSS
/users/login.php?error=XSS
Persistent XSS:
If comments are allowed, attackers can use this url /wiki/index.php?page_id=1#editcomments
to POST evil scripts and PHP code into the page. Sanitizing the input will prevent intrusion.
Also we see that on forums there is the same issue: (NEED TO SANITIZE THE INPUT)
/forums/index.php?t=1&post_comment_reply_id=1&post_comment_request=1#editcomments
White Screen of Death: (SQL Injection)
Critical information is listed o nthis page when you inject evil code.
Some work if you inject JavaScript Code into the Search box and some show
this page by following url: /wiki/list_pages.php?sort_mode='
By Search:
/search/index.php?tk=316dccdfb62a3cad613e&highlight=[SQL_INJECTION]=&search=go
Google Dork: Powered by bitweaver
Only becoming a Ethical Hacker, you can stop Black Hat Hackers. Learn with out
having to pay thousands!- http://kit.hackerscenter.com - The most comprehensive
security pack you will ever find on the net!
Powered by blists - more mailing lists