Humhub <= 0.10.0-rc.1 multiple persistent XSS vulnerabilities
Humhub [1] social networking kit versions 0.10.0-rc.1 and prior suffer from multiple persistent Cross-Site Scripting vulnerabilities, which have now been resolved in cooperation with the vendor [2], in various parts of the codebase. In the function actionPost() in '/protected/modules_core/post/controllers/PostController.php' [3], the $_POST variable is cleaned using a now-outdated version of the Yii framework's CmsInput extension stripClean() function [4], which improperly sanitizes user-input for XSS [5]. This situation also applies to actionPost() in '/protected/modules_core/comment/controllers/CommentController.php' [6]. Humhub-modules-mail versions 0.5.9 and prior (when used in conjunction with Humhub 0.10.0-rc.1 or prior) is affected by the same vulnerability as described above. The vulnerable code is located in the function actionCreate() in '/controllers/MailController.php' [8]. In addition to the above, the admin error logging codebase is vulnerable to a persistent XSS attack. The vulnerable code is located in the function actionView() in '/protected/modules_core/admin/controllers/LoggingController.php' [9].