Advisory:Calendar Script Easy Membership Management Application(E.M.M.A) Persistent XSS Vulnerability
Version:1.2
Vendor URL: http://calendarscripts.info/emma/
Demo Link: http://demo.pimteam.net/emma/admin.php
Author: Viknesvaran Sittaramane
Category: Webapp
Twiiter: https://twitter.com/csvsn
~.~.~.~.~.~.~.~.~.~.~.
Product Description
~.~.~.~.~.~.~.~.~.~.~.
E.M.M.A. Is Easy Membership Management Application
Features:
Create different subscription plans
Select subscription plan for every content
Upload protected pages, images and downloadable files
Your users can renew or upgrade their subscriptions any time
~.~.~.~.~.~.~.~.~.~.~.
Vulnerability Description
~.~.~.~.~.~.~.~.~.~.~.
E.M.M.A multiple fields suffers from Persistent XSS Vulnerability
~.~.~.~.~.~.
PoC-Exploit
~.~.~.~.~.~.
----------------------
Front End of E.M.M.A :
----------------------
Step1: Go to the Registration form
Registration Demo url : http://demo.pimteam.net/emma/index.php?action=register
Step2: On the fields Name, Address, Buiness name,Tel, Mob, Test Field, Association enter the malicious script then SIGN UP
Step3: Login using the registered email and password -> Go to Edit Profile -> Pop Up Appears
Step4: Persistant XSS Confirmed
Parameter used : '"-->
Screenshot: http://i47.tinypic.com/wvve4o.png
--------------------------------
Administrator Panel of E.M.M.A :
--------------------------------
Demo URL for E.M.M.A Administrator Panel : http://demo.pimteam.net/emma/admin.php?1358152765
Step1: Login to E.M.M.A
Step2:Under Manage users Tab (Manage users)
a.Edit any Username and replace username with a malicious script and Save it (Same goes to Create new user)
b. A Pop up appears -> Persistent XSS
Step3:Under Manage Site Tab (Content Categories)
a.Under name field insert a malicious script and Save it (Add Category)
b. A Pop up appears -> Persistent XSS
Step4:Under Manage Site Tab (Manage Contents->Click here to Upload Contents)
a.Content/page title and description field insert a malicious script and Save it (Add Plan)
b. A Pop up appears -> Persistent XSS
Step5:Under Manage Site Tab (Subscription Plans)
a.Under Plane name field insert a malicious script and Save it
b. A Pop up appears -> Persistent XSS
Parameter used : '"-->
~.~.~.~.~.~.~.~.~.~.
Disclosure Timeline
~.~.~.~.~.~.~.~.~.~.
14th January 2013 -> Vendor Notified