Title: ====== GetSimple CMS v3.1 - Multiple Web Vulnerabilities Date: ===== 2012-05-04 References: =========== http://www.vulnerability-lab.com/get_content.php?id=521 VL-ID: ===== 521 Common Vulnerability Scoring System: ==================================== 5 Introduction: ============= GetSimple is an XML based lite Content Management System. To go along with it s best-in-class user interface, we have loaded it with features that every website needs, but with nothing it doesn t. GetSimple has the ability to perform a simple Undo on just about every action. Combined with our intuitive UI makes for a great web editing user experience. - XML based data storage (no MySQL needed) - Best-in-Class User Interface - Protection from yourself (undo most actions) - Extremely easy to theme - Great support forum & wiki - Fully Internationalized core code & plugins - Entire code base is documented with PHPDoc standards - Integrated WYSIWYG editor with file-browser & internal linker - HTML5/CSS3 default theme - Built in sitemap.xml generator - Long list of available plugins by great developers - Fully internationalized control panel (Copy of the Vendor Homepage: http://get-simple.info ) Abstract: ========= The Vulnerability Laboratory Researcher Team discovered multiple Web Vulnerabilities in GetSimple CMS v3.1. Report-Timeline: ================ 2012-04-16: Public or Non-Public Disclosure Status: ======== Published Exploitation-Technique: ======================= Remote Severity: ========= Medium Details: ======== 1.1 Multiple persistent input validation vulnerabilities are detected in GetSimple v3.1 Content Management System. The bugs allow remote attackers to implement/inject malicious script code on the application side (persistent). Successful exploitation of the vulnerability can lead to session hijacking (manager/admin) or stable (persistent) context manipulation. Exploitation requires low user inter action. The bug is located on the email & permalink input fields of the application websettings. Vulnerable Module(s): [+] Website Settings - Email [+] Website Settings - Custom Permalink Structure Picture(s): ../1.png ../2.png 1.2 Multiple non persistent cross site scripting vulnerabilities are detected in GetSimple v3.1 Content Management System. The vulnerability allows remote attackers to hijack website customer, moderator or admin sessions with high required user inter action or local low privileged user account. Successful exploitation can result in account steal, phishing & client-side content request manipulation. Vulnerable Module(s): [+] Err [+] Error [+] Success [+] Path Picture(s): ../3.png ../4.png Proof of Concept: ================= 1.1 The persistent input validation vulnerabilities can be exploited by remote attacker with low or medium required user inter action. For demonstration or reproduce ... Review: Website Settings - Email

​​​​​