vendor:
Status2k
by:
Shayan Sadigh
9,8
CVSS
CRITICAL
Cross Site Scripting/XSS, SQL Injection
79, 89
CWE
Product Name: Status2k
Affected Version From: All
Affected Version To: All
Patch Exists: YES
Related CWE: CVE-2014-5088, CVE-2014-5089, CVE-2014-5090, CVE-2014-5091, CVE-2014-5092, CVE-2014-5093, CVE-2014-5094
CPE: N/A
Metasploit:
https://www.rapid7.com/db/vulnerabilities/adobe-reader-apsb15-15-CVE-2014-8450/, https://www.rapid7.com/db/vulnerabilities/adobe-reader-apsb15-15-CVE-2015-4449/, https://www.rapid7.com/db/vulnerabilities/adobe-reader-apsb15-15-CVE-2015-4450/, https://www.rapid7.com/db/vulnerabilities/adobe-reader-apsb15-15-CVE-2015-5088/, https://www.rapid7.com/db/vulnerabilities/adobe-reader-apsb15-15-CVE-2015-5089/, https://www.rapid7.com/db/vulnerabilities/adobe-reader-apsb15-15-CVE-2015-5092/, https://www.rapid7.com/db/vulnerabilities/adobe-reader-apsb15-15-CVE-2014-8450/, https://www.rapid7.com/db/vulnerabilities/adobe-reader-apsb15-15-CVE-2015-4449/, https://www.rapid7.com/db/vulnerabilities/adobe-reader-apsb15-15-CVE-2015-4450/, https://www.rapid7.com/db/vulnerabilities/adobe-reader-apsb15-15-CVE-2015-5088/, https://www.rapid7.com/db/vulnerabilities/adobe-reader-apsb15-15-CVE-2015-5089/, https://www.rapid7.com/db/vulnerabilities/adobe-reader-apsb15-15-CVE-2015-5092/, https://www.rapid7.com/db/vulnerabilities/adobe-reader-apsb15-15-CVE-2014-8450/, https://www.rapid7.com/db/vulnerabilities/adobe-reader-apsb15-15-CVE-2015-4449/, https://www.rapid7.com/db/vulnerabilities/adobe-reader-apsb15-15-CVE-2015-4450/, https://www.rapid7.com/db/vulnerabilities/adobe-reader-apsb15-15-CVE-2015-5088/, https://www.rapid7.com/db/vulnerabilities/adobe-reader-apsb15-15-CVE-2015-5089/, https://www.rapid7.com/db/vulnerabilities/adobe-reader-apsb15-15-CVE-2015-5092/
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux/Windows
2014
Status2k Multiple Vulnerabilities/0days
Cross site scripting/XSS can be done in the username field, <scriptalert("poc")</script, etc. SQLi vulnerability in the GET (log) param can be exploited by site.com/s2kdir/admin/options/logs.php?log=[sqli].
Mitigation:
Input validation and sanitization should be done to prevent XSS and SQL injection attacks.