header-logo
Suggest Exploit
vendor:
Amiro.CMS
by:
SecurityFocus
7.5
CVSS
HIGH
Multiple Cross-Site Scripting, HTML-Injection, Information-Disclosure
79, 200, 264
CWE
Product Name: Amiro.CMS
Affected Version From: 5.4.2000
Affected Version To: 5.4.2000
Patch Exists: Yes
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2010

Amiro.CMS Multiple Input-Validation Vulnerabilities

Amiro.CMS is prone to multiple input-validation vulnerabilities including multiple cross-site scripting issues, an HTML-injection issue, and an information-disclosure issue. An attacker may leverage the issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials, control how the site is rendered to the user and disclose sensitive information which may aid in launching further attacks.

Mitigation:

Input validation should be used to ensure that user-supplied data is properly sanitized before being used in the application. Additionally, the application should be configured to use secure session cookies.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/42430/info

Amiro.CMS is prone to multiple input-validation vulnerabilities including multiple cross-site scripting issues, an HTML-injection issue, and an information-disclosure issue.

An attacker may leverage the issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials, control how the site is rendered to the user and disclose sensitive information which may aid in launching further attacks.

Amiro.CMS 5.4.0 is affected; other versions may be vulnerable as well. 

'status_msg' = a: 2: (s: 3: "sys"; a: 0: () s: 5: "plain"; a: 1: (i: 0; a: 2: (s: 3: "msg "; s: 68:" ONsec.ru - XSS test [ALERT] \ "); alert (document.cookie) / / alert ([/ ALERT]"; s: 4: "type"; s: 4: "none ";}}}