vendor:
SkaDate Lite
by:
Gjoko 'LiquidWorm' Krstic
8,8
CVSS
HIGH
Multiple XSRF And Persistent XSS
352
CWE
Product Name: SkaDate Lite
Affected Version From: 2.0 (build 7651)
Affected Version To: 2.0 (build 7651)
Patch Exists: NO
Related CWE: N/A
CPE: a:skalfa:skadate_lite:2.0
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: CentOS Linux 6.5 (Final), nginx/1.6.0, PHP/5.3.28, MySQL 5.5.37
2014
SkaDate Lite 2.0 Multiple XSRF And Persistent XSS Vulnerabilities
SkaDate Lite version 2.0 suffers from multiple cross-site request forgery and stored xss vulnerabilities. The application allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site. Input passed to several POST parameters is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
Mitigation:
Input validation should be used to ensure that untrusted data is not used to update a database, modify a file, or perform any other sensitive actions. Additionally, the application should perform checks to verify that the request is being made by an authenticated user.