Document Title: =============== Weblication CMS Core & Grid v12.6.24 - Multiple Cross Site Scripting Vulnerabilities References (Source): ==================== https://www.vulnerability-lab.com/get_content.php?id=2121 Release Date: ============= 2018-02-21 Vulnerability Laboratory ID (VL-ID): ==================================== 2121 Common Vulnerability Scoring System: ==================================== 3.5 Vulnerability Class: ==================== Cross Site Scripting - Persistent Current Estimated Price: ======================== 500a! - 1.000a! Product & Service Introduction: =============================== https://help.weblication.de/help12/ Abstract Advisory Information: ============================== The vulnerability laboratory core research team discovered a persistent cross site vulnerability in the official Weblication CMS Core & Grid v12.006.024 CMS. Vulnerability Disclosure Timeline: ================================== 2018-02-21: Public Disclosure (Vulnerability Laboratory) Discovery Status: ================= Published Affected Product(s): ==================== Exploitation Technique: ======================= Remote Severity Level: =============== Medium Authentication Type: ==================== Restricted authentication (user/moderator) - User privileges User Interaction: ================= Low User Interaction Disclosure Type: ================ Independent Security Research Technical Details & Description: ================================ A persistent cross site scripting vulnerability has been discovered in the official Weblication CMS Core & Grid v12.006.024 CMS. The vulnerability allows remote attackers to inject own malicious script codes to the application-side of the service to compromise sensitive user data or affected web-application contents. The security vulnerability is located in the `wFilemanager.php` & `index.php` files of the `/grid5/scripts/` modules. The injection point is located in the Project `Title` and the execution point occurs in the `Inhaltsprojekte` output listing section. Remote attackers with privileged user accounts are able to inject own malicious script code with persistent attack vector to compromise user session credentials or to manipulate the affected web-application module output context. The request method to inject is POST and the attack vector is reflected. The injection point is located in the project Title and the execution point occurs in the Inhaltsprojekte output listing section. Successful exploitation of the vulnerability results in session hijacking, persistent phishing attacks, persistent external redirects to malicious source and persistent manipulation of affected or connected application modules. Request Method(s): [+] POST Vulnerable File(s): [+] index.php [+] wFilemanager.php Vulnerable Input Field(s): [+] Title Affected Module(s): [+] Inhaltsprojekte Proof of Concept (PoC): ======================= The persistent vulnerability can be exploited by remote attackers with low privilege web-application user account and low user interaction. For security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue. PoC Inject: Title https://grid.localhost:8080/weblication/grid5/scripts/wFilemanager.php?action=showMaskEditOptionsProject&path=/img-src-x-img-img-src-x-img- PoC Execute: Inhaltsprojekte https://grid.localhost:8080/weblication/grid5/apps/wEditorWd8/index.php?path=/default-wGlobal/wGlobal/content/variables/ default.wVariables.php&target=be&selectedTab=&display=&action=startedit&referrer=%2Fde%2Findex.php&redirectEndEdit=&showFileOptions=&anchor= PoC: Payload "> PoC: Vulnerable Source
Projektbasis
Projekt basiert auf 
base_source
ZusA$?tzliche Weblics Quellen 
base_sources_additional
z.B. password@http://IHREDOMAIN/vorlageprojekt
Inhaltsprojekte
 
/de Inhalte
/img-src-x-img-img-src-x-img- ">