<<< Date Index >>>     <<< Thread Index >>>

Bitweaver XSS & SQL Injection Vulnerability



 [HSC] Bitweaver XSS & SQL Injection Vulnerability


Bitweaver is an open source content management system. Its speed and
power are ideal for large-scale community websites and corporate applications,
but it is simple enough for non-technical small site users to set up and
administrate. It comes fully featured on install but is easy to extend.


Hackers Center Security Group (http://www.hackerscenter.com)
Credit: DoZ


Risk: Medium
Class: Cross-Site Scripting & SQL


Vendor: http://www.bitweaver.org/
Product: Bitweaver
Version: 2.0.0 & Previous



Examples:


/users/register.php/XSS
/search/index.php/XSS
/users/login.php?error=XSS


Persistent XSS:

If comments are allowed, attackers can use this url 
/wiki/index.php?page_id=1#editcomments
to POST evil scripts and PHP code into the page. Sanitizing the input will 
prevent intrusion.

Also we see that on forums there is the same issue: (NEED TO SANITIZE THE INPUT)

/forums/index.php?t=1&post_comment_reply_id=1&post_comment_request=1#editcomments


White Screen of Death: (SQL Injection)

Critical information is listed o nthis page when you inject evil code.
Some work if you inject JavaScript Code into the Search box and some show
this page by following url: /wiki/list_pages.php?sort_mode='

By Search:

/search/index.php?tk=316dccdfb62a3cad613e&highlight=[SQL_INJECTION]=&search=go


Google Dork: Powered by bitweaver



Only becoming a Ethical Hacker, you can stop Black Hat Hackers. Learn with out
having to pay thousands!- http://kit.hackerscenter.com - The most comprehensive
security pack you will ever find on the net!