vendor:
BEdita CMS
by:
N/A
8.8
CVSS
HIGH
Cross-Site Scripting (CWE-79) & Cross-Site Request Forgery, CSRF (CWE-352)
79, 352
CWE
Product Name: BEdita CMS
Affected Version From: 3.5.2000
Affected Version To: 3.5.2000
Patch Exists: YES
Related CWE: N/A
CPE: bedita:bedita_cms
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2015
BEdita CMS – XSS & CSRF Vulnerability in Version 3.5.0
When an authenticated user of BEdita CMS is creating a newsletter mail group, the following POST request is sent to the server. The “name” parameter is vulnerable to XSS. An attacker can inject malicious JavaScript code in the “name” parameter and execute it in the context of the victim’s browser. When an authenticated user of BEdita CMS is creating a new user, the following POST request is sent to the server. The “name”, “password”, “password_confirm”, “email” and “status” parameters are vulnerable to CSRF. An attacker can craft a malicious link or a malicious form and send it to the victim. If the victim clicks on the link or submits the form, a new user will be created in BEdita CMS.
Mitigation:
Ensure that user input is properly sanitized and validated before being used in the application. Implement CSRF protection mechanisms such as CSRF tokens.