<<< Date Index >>>     <<< Thread Index >>>

Speedwiki 2.0 Arbitrary File Upload Vulnerability



product :Speedwiki 2.0 
vendor site: http://speedywiki.sourceforge.net/
risk:critical

 
a user logged in , can upload a PHP script on the server , by the upload script 
, there's actually no upload filter on this cms 
path : /speedywiki/index.php?upload=1

xss get :
/index.php?showRevisions=</textarea>'"><script>alert(document.cookie)</script>




full path disclosure : 
/speedywiki/index.php?showRevisions[]=
/speedywiki/index.php?searchText[]=
/speedywiki/upload.php

laurent gaffié & benjamin mossé
http://s-a-p.ca/
contact: saps.audit@xxxxxxxxx