Qool CMS v2.0 RC2 Multiple HTML And JavaScript Injection Vulnerabilities
Title: Qool CMS v2.0 RC2 Multiple HTML And JavaScript Injection Vulnerabilities
Advisory ID: ZSL-2013-5133
Type: Local/Remote
Impact: Cross-Site Scripting
Risk: (3/5)
Release Date: 06.03.2013
Apache 2.4.2 (Win32)
PHP 5.4.4
MySQL 5.5.25a
[2] http://www.exploit-db.com/exploits/24627/
[3] http://packetstormsecurity.com/files/120691
[4] http://www.securityfocus.com/bid/58328
[5] http://www.osvdb.org/show/osvdb/90974
[6] http://www.osvdb.org/show/osvdb/90975
[7] http://www.osvdb.org/show/osvdb/90976
[8] http://www.osvdb.org/show/osvdb/90977
[9] http://www.osvdb.org/show/osvdb/90978
[10] http://www.osvdb.org/show/osvdb/90979
[11] http://www.osvdb.org/show/osvdb/90980
[12] http://www.osvdb.org/show/osvdb/90981
[13] http://xforce.iss.net/xforce/xfdb/82669
[07.03.2013] - Added reference [1], [2], [3] and [4]
[08.03.2013] - Added reference [5], [6], [7], [8], [9], [10], [11] and [12]
[10.03.2013] - Added reference [13]
Web: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk
Advisory ID: ZSL-2013-5133
Type: Local/Remote
Impact: Cross-Site Scripting
Risk: (3/5)
Release Date: 06.03.2013
Summary
Qool CMS is a content management system that helps web masters be more productive. Qool has been built with both worlds (web master, web developer) in mind. It is easy to create addons (extensions) for the system but you can really do without them too.Description
Qool CMS suffers from multiple persistent cross-site scripting vulnerabilities. The issues are triggered when input passed via several POST parameters to several scripts is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.Vendor
Qool CMS - http://www.qool.grAffected Version
2.0 RC2 (Codename: Sommige)Tested On
Microsoft Windows 7 Ultimate SP1 (EN)Apache 2.4.2 (Win32)
PHP 5.4.4
MySQL 5.5.25a
Vendor Status
N/APoC
qoolcms_xss.htmlCredits
Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>References
[1] http://cxsecurity.com/issue/WLB-2013030052[2] http://www.exploit-db.com/exploits/24627/
[3] http://packetstormsecurity.com/files/120691
[4] http://www.securityfocus.com/bid/58328
[5] http://www.osvdb.org/show/osvdb/90974
[6] http://www.osvdb.org/show/osvdb/90975
[7] http://www.osvdb.org/show/osvdb/90976
[8] http://www.osvdb.org/show/osvdb/90977
[9] http://www.osvdb.org/show/osvdb/90978
[10] http://www.osvdb.org/show/osvdb/90979
[11] http://www.osvdb.org/show/osvdb/90980
[12] http://www.osvdb.org/show/osvdb/90981
[13] http://xforce.iss.net/xforce/xfdb/82669
Changelog
[06.03.2013] - Initial release[07.03.2013] - Added reference [1], [2], [3] and [4]
[08.03.2013] - Added reference [5], [6], [7], [8], [9], [10], [11] and [12]
[10.03.2013] - Added reference [13]
Contact
Zero Science LabWeb: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk