Home / os / solaris

bitweaver-sqlxss.txt

Posted on 11 December 2007

[HSC] Bitweaver XSS & SQL Injection Vulnerability Bitweaver is an open source content management system. Its speed and power are ideal for large-scale community websites and corporate applications, but it is simple enough for non-technical small site users to set up and administrate. It comes fully featured on install but is easy to extend. Hackers Center Security Group (http://www.hackerscenter.com) Credit: DoZ Risk: Medium Class: Cross-Site Scripting & SQL Vendor: http://www.bitweaver.org/ Product: Bitweaver Version: 2.0.0 & Previous Examples: /users/register.php/XSS /search/index.php/XSS /users/login.php?error=XSS Persistent XSS: If comments are allowed, attackers can use this url /wiki/index.php?page_id=1#editcomments to POST evil scripts and PHP code into the page. Sanitizing the input will prevent intrusion. Also we see that on forums there is the same issue: (NEED TO SANITIZE THE INPUT) /forums/index.php?t=1&post_comment_reply_id=1&post_comment_request=1#editcomments White Screen of Death: (SQL Injection) Critical information is listed o nthis page when you inject evil code. Some work if you inject JavaScript Code into the Search box and some show this page by following url: /wiki/list_pages.php?sort_mode=' By Search: /search/index.php?tk=316dccdfb62a3cad613e&highlight=[SQL_INJECTION]=&search=go Google Dork: Powered by bitweaver Only becoming a Ethical Hacker, you can stop Black Hat Hackers. Learn with out having to pay thousands!- http://kit.hackerscenter.com - The most comprehensive security pack you will ever find on the net!

 

TOP