|
|
|
|
Menu |
|
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
|
User Info |
|
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 155
Members: 0
Total: 155
|
|
|
|
|
|
Full disclosure |
|
|
|
|
|
|
|
|
|
IT Security and Insecurity Portal |
|
|
TINY_MCE / PhpNuke advisory |
|
Posted: Tue Nov 22, 2005 4:59 pm |
|
|
waraxe |
Site admin |
|
|
Joined: May 11, 2004 |
Posts: 2407 |
Location: Estonia, Tartu |
|
|
|
|
|
|
From:
http://packetstormsecurity.org/0511-advisories/vulnuke78bx.txt
Code: |
PHP Nuke <= 7.8 with TINY_MCE script CROSS-SITE-SCRIPTING Vulnerability
-----------------------------------------------------------------------
Software: PHP Nuke 7.8
Type: Cross-site scripting / html-injection
Testing-platform:
PHP Nuke v7.8
Linux Debian Sarge v3
Mozilla-Firefox v1
MySQL v4
PHP v4
Risk: High
Date: 19 XI 2005
Vandor: PHP-Nuke (phpnuke.org)
Credit:
-------
Bartosz 'bratex' Nowakowski from bxportal.limes.com.pl
Description:
------------
PHP Nuke 7.8 is a advanced CMS (Content-Managment-System) designed to use in Internet.
The administrator has full control of all features and modules making his website
useful and 100% interactive with users.
Vulnerability:
--------------
PHP Nuke <= 7.8, if used with TINY_MCE content editor (extension to the TEXTAREA),
has a cross-site scripting vulnerability.
As TINY_MCE is protected from malicious input by JavaScript, attacker should turn
JavaScript off, then go to Submit_News or other similar module he/she has
access to (not such unusual!), write:
[some text]<a href="[addr]" onclick="javascript:alert(document.cookie);">this addr</a>.
And submit :)
If site admin has JavaScript turned on, malicious script will execute when accepting
news in the administration panel. In example above, admin will see JavaScript
message box when trying to check submitted link. After experiments, I managed to grab
all admin's cookies ;) Have fun :P
Note: probably simple SCRIPT tag won't work. Instead, use for example IMG or A tags...
Vulnerable modules:
-------------------
Submit_News
Web_Links
Downloads
Journal
Feedback (Vulnerability is useless, but exists)
Articles and Surveys comments
Maybe some other (unoficial) modules...
Solution:
---------
Turn off JS support in your browser, read carefully all posted data and wait for patch :)
Vendor:
-------
I sent this file to them :)
|
|
|
|
|
|
|
www.waraxe.us Forum Index -> PhpNuke
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|