Title: ====== Boonex Dolphin v7.0.9 CMS - Multiple Web Vulnerabilities Date: ===== 2012-05-18 References: =========== http://www.vulnerability-lab.com/get_content.php?id=565 http://www.vulnerability-lab.com/get_content.php?id=566 ID: Changeset 16256 VL-ID: ===== 565 Common Vulnerability Scoring System: ==================================== 5.5 Introduction: ============= Dolphin 7 - open-source, downloadable, scalable, customizable, full-featured, independent and free software package for building social networks, dating sites and niche communities. Dolphin is the only all-in-one bundle of PHP community scripts, Flash plugins, Adobe AIR and Mobile apps that provide full control, freedom and flexibility. Launch your site, customize it and watch it grow! Dolphin social is a mobile suite of the cms application. It is also available for apple iphones with iOS and android mobiles. (Copy of the Vendor Homepage: http://www.boonex.com/dolphin ) Abstract: ========= The Vulnerability Laboratory Research Team discovered multiple Web Vulnerabilities in the Boonex Dolphin v7.0.9 CMS. Report-Timeline: ================ 2012-05-08: Researcher Notification & Coordination 2012-05-10: Vendor Notification 2012-05-12: Vendor Response/Feedback 2012-05-17: Vendor Fix/Patch 2012-05-18: Public or Non-Public Disclosure Status: ======== Published Affected Products: ================== Boonex Product: Dolphin CMS v7.0.9 Exploitation-Technique: ======================= Remote Severity: ========= High Details: ======== Multiple persistent input validation vulnerabilities are detected in the Boonex Dolphin CMS v7.0.9 content management system. The bugs allow remote attackers to implement/inject malicious script code on the application side (persistent). The vulnerabilities are located in the user profile Map location name & listing but also in the unsanitized album (gallery) name & output listings. The CMS itself allows via management function to publish vulnerable albums (name) & profiles (location) (Public, Me, Share & Co) which impacts a high risk. Remote attackers can exchange the persistent malicious script code after the inject with the users profile or album share functions. Exploitation requires low user inter action & low privileged user account. Successful exploitation of the vulnerability can lead to session hijacking (manager/admin) or stable (persistent) context manipulation. Vulnerable Location(s): [+] Profile [Location] - Location Name & Listing [+] Album (Gallery) - Album Name & Listing Vulnerable Module(s): [+] disignBoxFirst [+] boxContent > dbContent Vulnerable Parameter(s): [+] dbTitle [+] bx_map_curr_loc Proof of Concept: ================= The persistent vulnerabilities can be exploited by remote attackers with low required user inter action. For demonstration or reproduce ... Review: Album (Gallery) - Display Name