看板 Bugtraq 關於我們 聯絡資訊
Advisory ID: HTB23200 Product: Seo Panel Vendor: www.seopanel.in Vulnerable Version(s): 3.4.0 and probably prior Tested Version: 3.4.0 Advisory Publication: January 29, 2014 [without technical details] Vendor Notification: January 29, 2014=20 Vendor Patch: May 15, 2014=20 Public Disclosure: May 16, 2014=20 Vulnerability Type: Cross-Site Scripting [CWE-79] CVE Reference: CVE-2014-1855 Risk Level: Medium=20 CVSSv2 Base Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N) Solution Status: Fixed by Vendor Discovered and Provided: High-Tech Bridge Security Research Lab ( https://w= ww.htbridge.com/advisory/ )=20 ---------------------------------------------------------------------------= -------------------- Advisory Details: High-Tech Bridge Security Research Lab discovered two vulnerabilities in Se= o Panel, which can be exploited to perform Cross-Site Scripting (XSS) attac= ks agains users of the vulnerable application to steal their sensitive data= =2E 1) Two Cross-Site Scripting (XSS) in Seo Panel: CVE-2014-1855 1.1 The vulnerability exists due to insufficient sanitisation of user-suppl= ied data in "capcheck" HTTP GET parameter passed to "/directories.php" scri= pt. A remote attacker can trick a logged-in user to open a specially crafte= d link and execute arbitrary HTML and script code in browser in context of = the vulnerable website. The exploitation example below uses the "alert()" JavaScript function to di= splay "immuniweb" word: http://[host]/directories.php?capcheck=3D1%22%20onmouseover%3dalert%28%22im= muniweb%22%29;%20%22&dir_name=3D&google_pagerank=3D&langcode=3D&pageno=3D8&= sec=3Ddirectorymgr&stscheck=3D1 1.2 The vulnerability exists due to insufficient sanitisation of user-suppl= ied data in "keyword" HTTP GET parameter passed to "/proxy.php" script. A r= emote attacker can trick a logged-in user to open a specially crafted link = and execute arbitrary HTML and script code in browser in context of the vul= nerable website. The exploitation example below uses the "alert()" JavaScript function to di= splay "immuniweb" word: http://[host]/proxy.php?keyword=3D1%22%20onmouseover%3dalert%28%22immuniweb= %22%29;%20%22&status=3Dactive ---------------------------------------------------------------------------= -------------------- Solution: Update to Seo Panel 3.5.0 More Information: http://forum.seopanel.in/viewtopic.php?f=3D7&t=3D10978 ---------------------------------------------------------------------------= -------------------- References: [1] High-Tech Bridge Advisory HTB23200 - https://www.htbridge.com/advisory/= HTB23200 - Two Cross-Site Scripting (XSS) Vulnerabilities in Seo Panel. [2] Seo Panel - http://www.seopanel.in/ - World's first seo control panel f= or multiple websites. [3] Common Vulnerabilities and Exposures (CVE) - http://cve.mitre.org/ - in= ternational in scope and free for public use, CVE=C2=AE is a dictionary of = publicly known information security vulnerabilities and exposures. [4] Common Weakness Enumeration (CWE) - http://cwe.mitre.org - targeted to = developers and security practitioners, CWE is a formal list of software wea= kness types. [5] ImmuniWeb=C2=AE SaaS - https://www.htbridge.com/immuniweb/ - hybrid of = manual web application penetration test and cutting-edge vulnerability scan= ner available online via a Software-as-a-Service (SaaS) model. ---------------------------------------------------------------------------= -------------------- Disclaimer: The information provided in this Advisory is provided "as is" a= nd without any warranty of any kind. Details of this Advisory may be update= d in order to provide as accurate information as possible. The latest versi= on of the Advisory is available on web page [1] in the References.