vendor:
Oxwall
by:
Gjoko 'LiquidWorm' Krstic
8,8
CVSS
HIGH
Cross-site request forgery and stored XSS
352
CWE
Product Name: Oxwall
Affected Version From: 1.7.0 (build 7907 and 7906)
Affected Version To: 1.7.0 (build 7907 and 7906)
Patch Exists: YES
Related CWE: N/A
CPE: a:oxwall_software_foundation:oxwall
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Kali Linux 3.7-trunk-686-pae, Apache/2.2.22 (Debian), PHP 5.4.4-13(apache2handler), MySQL 5.5.28
2014
Oxwall 1.7.0 Multiple CSRF And Stored XSS Vulnerabilities
Oxwall version 1.7.0 suffers from multiple cross-site request forgery and stored XSS vulnerabilities. The application allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site. Input passed to several POST parameters is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
Mitigation:
Input validation should be performed to ensure that untrusted data is not used to update a web site before displaying the data to users.