vendor:
Redaxo CMS
by:
Tim Herres
8,3
CVSS
HIGH
SQL Injection, Reflected XSS, Storng XSS
89, 79, 79
CWE
Product Name: Redaxo CMS
Affected Version From: Redaxo CMS v5.0.0
Affected Version To: Redaxo CMS v5.0.0
Patch Exists: YES
Related CWE: na
CPE: a:redaxo:redaxo_cms
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: FF42
2016
LSE Leading Security Experts GmbH – Security Advisory 2016-01-18
Redaxo is an easy to use open source content management system. A user can create his own website using the Redaxo CMS. During internal research, multiple vulnerabilities were identified in the Redaxo CMS software. The software is vulnerable to an SQL-Injection attack, allowing an authenticated user to access the database in an unsafe way. Some parts of the application do not have sufficient input validation and output encoding. This means user supplied input is inserted in an unsafe way resulting in a Cross Site Scripting vulnerability.
Mitigation:
The vendor has released a patch for the identified vulnerabilities.