# Exploit Title: CompactCMS 1.4.1 Multiple Vulnerabilities # Google Dork: intext:"Maintained with CompactCMS.nl" intitle:"Print: *" # Date: 17-12-2010 # Author: NLSecurity # Software Link: http://files.compactcms.nl/stable/ # Version: CompactCMS 1.4.1 # Credits: http://www.nlsecurity.org/ # Extra: irc.6667.eu #main Description: CompactCMS 1.4.1 has multiple XSS and File Disclosure vulnerabilities. These file disclosures will appear if the users have access to view open directories. --- File Disclosures --- /admin/includes/modules/backup-restore/ /admin/includes/modules/backup-restore/content-owners/ /admin/includes/modules/backup-restore/module-management/ /admin/includes/modules/backup-restore/permissions/ /admin/includes/modules/backup-restore/template-editor/ /admin/includes/modules/backup-restore/user-management/ /admin/includes/fancyupload/ /admin/includes/fancyupload/Assets/ /admin/includes/fancyupload/Assets/Icons/ /admin/includes/fancyupload/Backend/ /admin/includes/fancyupload/Backend/Assets/ /admin/includes/fancyupload/Backend/Assets/getid3/ /admin/includes/fancyupload/Language/ /admin/includes/fancyupload/Source/ /admin/includes/fancyupload/Source/Uploader/ /admin/includes/edit_area/ /admin/includes/edit_area/images/ /admin/includes/edit_area/langs/ /admin/includes/edit_area/reg_syntax/ /admin/img/mochaui/ /admin/img/styles/ /admin/img/uploader/ /_docs/ ... Perhaps more, but this should give an idea. :-) --- Cross-Site Scripting Vulnerabilities (XSS) --- /afdrukken.php?page=">[XSS] This can be found on line 48: Vuln: $_GET['page'] --- /admin/includes/modules/permissions/permissions.Manage.php?status=notice&msg=[XSS] This can be found on line 62: '.$_GET['msg'].''; } ?> Vuln: $_GET['msg'] --- /lib/includes/auth.inc.php Username input field (userName) has an XSS vulnerability when using POST data. This can be found on line 119: Vuln: $_POST['userName']