header-logo
Suggest Exploit
vendor:
b2evolution
by:
AutoSec Tools
N/A
CVSS
N/A
Persistent Cross-site Scripting
79
CWE
Product Name: b2evolution
Affected Version From: 4.0.3
Affected Version To: 4.0.3
Patch Exists: N/A
Related CWE: N/A
CPE: a:b2evolution:b2evolution:4.0.3
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows Vista + XAMPP
2011

b2evolution 4.0.3 Persistent Cross-site Scripting

A persistent cross-site scripting vulnerability in b2evolution 4.0.3 can be exploited to execute arbitrary JavaScript. Data submitted to the 'Comment text' input of the blog comment form is not properly santized. As a result, javascript can be executed throughout the application (admin dashboard, admin comment full text view, possibly other pages).

Mitigation:

Input validation and output encoding should be used to prevent XSS attacks.
Source

Exploit-DB raw data:

Source: http://packetstormsecurity.org/files/view/99362/b2evolution403-xss.txt

------------------------------------------------------------------------
Software................b2evolution 4.0.3
Vulnerability...........Persistent Cross-site Scripting
Threat Level............Moderate (2/5)
Download................http://b2evolution.net/
Vendor Contact Date.....3/15/2011
Disclosure Date.........3/15/2011
Tested On...............Windows Vista + XAMPP
------------------------------------------------------------------------
Author..................AutoSec Tools
Site....................http://www.autosectools.com/
Email...................John Leitch <john@autosectools.com>
------------------------------------------------------------------------


--Description--

A persistent cross-site scripting vulnerability in b2evolution 4.0.3
can be exploited to execute arbitrary JavaScript.


--Exploit--

Data submitted to the "Comment text" input of the blog comment form is
not properly santized. As a result, javascript can be executed
throughout the application (admin dashboard, admin comment full text
view, possibly other pages).


--PoC--

<?<a><script>alert(0)</script>