PHP Nuke <= 7.8 with TINY_MCE script CROSS-SITE-SCRIPTING Vulnerability ----------------------------------------------------------------------- Software: PHP Nuke 7.8 Type: Cross-site scripting / html-injection Testing-platform: PHP Nuke v7.8 Linux Debian Sarge v3 Mozilla-Firefox v1 MySQL v4 PHP v4 Risk: High Date: 19 XI 2005 Vandor: PHP-Nuke (phpnuke.org) Credit: ------- Bartosz 'bratex' Nowakowski from bxportal.limes.com.pl Description: ------------ PHP Nuke 7.8 is a advanced CMS (Content-Managment-System) designed to use in Internet. The administrator has full control of all features and modules making his website useful and 100% interactive with users. Vulnerability: -------------- PHP Nuke <= 7.8, if used with TINY_MCE content editor (extension to the TEXTAREA), has a cross-site scripting vulnerability. As TINY_MCE is protected from malicious input by JavaScript, attacker should turn JavaScript off, then go to Submit_News or other similar module he/she has access to (not such unusual!), write: [some text]this addr. And submit :) If site admin has JavaScript turned on, malicious script will execute when accepting news in the administration panel. In example above, admin will see JavaScript message box when trying to check submitted link. After experiments, I managed to grab all admin's cookies ;) Have fun :P Note: probably simple SCRIPT tag won't work. Instead, use for example IMG or A tags... Vulnerable modules: ------------------- Submit_News Web_Links Downloads Journal Feedback (Vulnerability is useless, but exists) Articles and Surveys comments Maybe some other (unoficial) modules... Solution: --------- Turn off JS support in your browser, read carefully all posted data and wait for patch :) Vendor: ------- I sent this file to them :)