Title -Collectd-web XSS # Exploit Title : XSS Vulnerabilitie in Collectd-web # Date: Sun May 22 11:55:36 EDT 2016 # Reported Date : Sun May 22 11:55:36 EDT 2016 # Vendor Homepage: https://collectd.org/wiki/index.php/Collectd-web # Version: Version: 0.4.0 # Software Link: https://github.com/httpdss/collectd-web # solution :https://github.com/httpdss/collectd-web/issues/77 # Exploit Author :MehrdadLinux # Tested On : Linux Platforms. # Facebook : https://facebook.com/MehrdadLinux # Twitter : http://twitter.com/MehrdadLinux # Detailed Vul: http://blog.opsnit.com =========================================================================================== 1. VULNERABILITY ------------------------- XSS Vulnerabilitie in Collectd-web 0.4.0 – January2016 2. BACKGROUND ------------------------- Collectd-web is a web-based front-end for RRD data collected by collectd. It is based on contrib/collection.cgi, a demo CGI script included in collectd. With strong emphasis on the usage of Jquery and JqueryUI, Collectd-Web manages to give sysadmins a nice yet functional interface. 3. DESCRIPTION ------------------------- XSS in ajax_post.php https://github.com/httpdss/collectd-web/blob/master/media/jqtouch/demos/main/ajax_post.php 1 11
12
13

14 Back 15
16 29
30 33 Submit 34 35
36
in line 5 have VULNERABILITY in zip POST method ====================================Exploit========================================= ">'>"); $buf = curl_exec ($ch); curl_close($ch); unset($ch); echo $buf; ?> ====================================Exploit========================================= 4. discovered by : ------------------------- The vulnerability has been discovered by Mehrdad Abbasi(MehrdadLinux) and Hossein Masoudi (cs.masoudi) email : MehrdadLinux (at) gmail (dot) com http://opsnit.com 5 .LEGAL NOTICES ------------------------- The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. I accept no responsibility for any damage caused by the use or misuse of this information.