[HSC] Bitweaver XSS & SQL Injection Vulnerability


Bitweaver is an open source content management system. Its speed and

power are ideal for large-scale community websites and corporate applications,

but it is simple enough for non-technical small site users to set up and

administrate. It comes fully featured on install but is easy to extend.



Hackers Center Security Group (http://www.hackerscenter.com)

Credit: DoZ



Risk: Medium

Class: Cross-Site Scripting & SQL



Vendor: http://www.bitweaver.org/

Product: Bitweaver

Version: 2.0.0 & Previous




Examples:



/users/register.php/XSS

/search/index.php/XSS

/users/login.php?error=XSS



Persistent XSS:


If comments are allowed, attackers can use this url 
/wiki/index.php?page_id=1#editcomments

to POST evil scripts and PHP code into the page. Sanitizing the input will 
prevent intrusion.


Also we see that on forums there is the same issue: (NEED TO SANITIZE THE INPUT)


/forums/index.php?t=1&post_comment_reply_id=1&post_comment_request=1#editcomments



White Screen of Death: (SQL Injection)


Critical information is listed o nthis page when you inject evil code.

Some work if you inject JavaScript Code into the Search box and some show

this page by following url: /wiki/list_pages.php?sort_mode='


By Search:


/search/index.php?tk=316dccdfb62a3cad613e&highlight=[SQL_INJECTION]=&search=go



Google Dork: Powered by bitweaver




Only becoming a Ethical Hacker, you can stop Black Hat Hackers. Learn with out

having to pay thousands!- http://kit.hackerscenter.com - The most comprehensive

security pack you will ever find on the net!

Reply via email to