exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Pecio CMS 2.0.5 Cross Site Scripting

Pecio CMS 2.0.5 Cross Site Scripting
Posted Oct 22, 2010
Authored by Antu Sanadi | Site secpod.com

Pecio CMS version 2.0.5 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 05dc4479ffde12054111c5b44dadfafa2c5120d85eb6482e1494df7de92e8cf7

Pecio CMS 2.0.5 Cross Site Scripting

Change Mirror Download
###############################################################################
Pecio Content Management System (CMS) v2.0.5 Cross-Site scripting Vulnerability

SecPod Technologies (www.secpod.com)
Author: Antu Sanadi
###############################################################################

SecPod ID: 1006 09/10/2010 Issue Discovered
09/21/2010 Vendor Notified
09/21/2010 Vendor Confirmed
Solution not available.


Class: Cross-Site Scripting Severity: Medium


Overview:
---------
Pecio Content Management System (CMS) is prone to cross-site scripting
vulnerability.

Technical Description:
----------------------
Pecio Content Management System (CMS) is prone to a cross-site scripting
vulnerability as it fails to properly sanitize user-supplied input.

Input passed via the 'target' parameter in 'search' action in index.php is
not properly verified before it is returned to the user. This can be exploited
to execute arbitrary HTML and script code in a user's browser session in the
context of a vulnerable site. This may allow an attacker to steal cookie-based
authentications and launch further attacks.

The vulnerability has been tested in Pecio CMS v2.0.5 and 2.0.2 Other versions
may also be affected.


Impact:
--------
Successful exploitation could allow an attacker to execute arbitrary HTML
code in a user's browser session in the context of a vulnerable application.


Affected Software:
------------------
Pecio CMS v2.0.5 and prior.

Tested on,
Pecio CMS v2.0.5 and 2.0.2(tested using Mozilla firefox browser)


References:
-----------
http://pecio-cms.com/
http://secpod.org/blog/?p=137
http://secpod.org/advisories/SECPOD_pecioCMS_XSS.txt

Proof of Concept:
-----------------
http://IP_ADDR/pecio/index.php?target=search&term=<script>alert('XSS-Test')</script>


Solution:
----------
Fix not available


Risk Factor:
-------------
CVSS Score Report
ACCESS_VECTOR = NETWORK
ACCESS_COMPLEXITY = MEDIUM
AUTHENTICATION = NONE
CONFIDENTIALITY_IMPACT = NONE
INTEGRITY_IMPACT = PARTIAL
AVAILABILITY_IMPACT = NONE
EXPLOITABILITY = PROOF_OF_CONCEPT
REMEDIATION_LEVEL = UNAVAILABLE
REPORT_CONFIDENCE = CONFIRMED
CVSS Base Score = 4.3 (MEDIUM) (AV:N/AC:M/Au:N/C:N/I:P/A:N)


Credits:
--------
Antu Sanadi of SecPod Technologies has been credited with the discovery of this
vulnerability.

Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close