Pivotx version 2.2.0 suffers from cross site scripting and path disclosure vulnerabilities.
3955d4d22a67c983d281640f1e88c83b0453bb1e1cfa3c241e7193174290648b
==================================
Vulnerability ID: HTB22788
Reference: http://www.htbridge.ch/advisory/xss_in_pivotx.html
Product: Pivotx
Vendor: Pivotx Team ( http://pivotx.net/ )
Vulnerable Version: 2.2.0
Vendor Notification: 11 January 2011
Vulnerability Type: XSS (Cross Site Scripting)
Status: Awaiting Vendor Solution
Risk level: Medium
Credit: High-Tech Bridge SA - Ethical Hacking & Penetration Testing (http://www.htbridge.ch/)
Vulnerability Details:
User can execute arbitrary JavaScript code within the vulnerable application.
The vulnerability exists due to failure in the "/includes/blogroll.php" script to properly sanitize user-supplied input in "color" variable.
Successful exploitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data.
The following PoC is available:
http://[host]/includes/blogroll.php?id=1&color=123;}</style><script>alert("XSS");</script>|
==================================
Vulnerability ID: HTB22790
Reference: http://www.htbridge.ch/advisory/xss_in_pivotx_1.html
Product: Pivotx
Vendor: Pivotx Team ( http://pivotx.net/ )
Vulnerable Version: 2.2.0
Vendor Notification: 11 January 2011
Vulnerability Type: XSS (Cross Site Scripting)
Status: Awaiting Vendor Solution
Risk level: Medium
Credit: High-Tech Bridge SA - Ethical Hacking & Penetration Testing (http://www.htbridge.ch/)
Vulnerability Details:
User can execute arbitrary JavaScript code within the vulnerable application.
The vulnerability exists due to failure in the "/includes/timwrapper.php" script to properly sanitize user-supplied input in "src" variable.
Successful exploitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data.
The following PoC is available:
http://[host]/includes/timwrapper.php?src=%22%3E%3Cscript%3Ealert%28%22XSS%22%29;%3C/script%3E
==================================
Vulnerability ID: HTB22789
Reference: http://www.htbridge.ch/advisory/path_disclousure_in_pivotx.html
Product: Pivotx
Vendor: Pivotx Team ( http://pivotx.net/ )
Vulnerable Version: 2.2.0
Vendor Notification: 11 January 2011
Vulnerability Type: Path disclosure
Status: Awaiting Vendor Solution
Risk level: Low
Credit: High-Tech Bridge SA - Ethical Hacking & Penetration Testing (http://www.htbridge.ch/)
Vulnerability Details:
The vulnerability exists due to failure in the "/includes/ping.php" & "/includes/spamping.php" scripts, it's possible to generate an error that will reveal the full path of the script.
A remote user can determine the full path to the web root directory and other potentially sensitive information.
http://[host]/includes/ping.php
http://[host]/includes/spamping.php