Share
## https://sploitus.com/exploit?id=VULNERLAB:2184
Document Title:
===============
PHPwind v9.1.0 - Multiple Cross Site Scripting Vulnerabilities
References (Source):
====================
https://www.vulnerability-lab.com/get_content.php?id=2184
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-13472
CVE-ID:
=======
CVE-2019-13472
Release Date:
=============
2019-07-02
Vulnerability Laboratory ID (VL-ID):
====================================
2184
Common Vulnerability Scoring System:
====================================
3.3
Vulnerability Class:
====================
Cross Site Scripting - Non Persistent
Current Estimated Price:
========================
500€ - 1.000€
Product & Service Introduction:
===============================
PHPWind is a forum program based on PHP and MySQL and one of the most frequently used forum programs.
It is a forum program developed by Hangzhou Detian Information Technology Co, Ltd, China. The predecessor
of PHPWind is ofstar. The source code for PHPWind can be downloaded for free, but it is not free software because the
license does not meet the definition of free software.
(COp of the Homepage: https://zh.wikipedia.org/wiki/PHPWind )
Abstract Advisory Information:
==============================
An independent vulnerability laboratory researcher discovered multiple cross site scripting vulnerabilities in the PhpWind v9.1.0 forum software application.
Vulnerability Disclosure Timeline:
==================================
2019-06-20: Researcher Notification & Coordination (Security Researcher)
2019-06-21: Vendor Notification (Security Department)
2019-**-**: Vendor Response/Feedback (Security Department)
2019-**-**: Vendor Fix/Patch (Service Developer Team)
2019-**-**: Security Acknowledgements (Security Department)
2019-07-04: Public Disclosure (Vulnerability Laboratory)
Discovery Status:
=================
Published
Exploitation Technique:
=======================
Remote
Severity Level:
===============
Low
Authentication Type:
====================
No authentication (guest)
User Interaction:
=================
Low User Interaction
Disclosure Type:
================
Coordinated Disclosure
Technical Details & Description:
================================
Multiple non-persistent cross site scripting vulnerabilities has been discovered in the PhpWind v9.1.0 forum software application.
The cross site vulnerability allows remote attacker to manipulate client-side browser requests to compromise content or session data.
The cross site scripting vulnerabilities are located in the `c`, and `m` parameters of the `index,php` file. Remote attackers are
able to inject own malicious script code (exp. javascript) to hijack user session credentials or to manipulate client-side the
web-application contents in local browsers. The injection point of the vulnerabilities are the vulnerable `c` and `m` parameters.
The attack vector is located on the application-side and the request method to inject/execute is GET.
The security risk of the non-persistent cross site scripting web vulnerabilities are estimated as medium with a cvss count of 3.3.
Exploitation of the web security vulnerability requires a privileged web-application user account and only low user interaction.
Successful exploitation of the client-side vulnerability results in session hijacking, non-persistent phishing, non-persistent
external redirects and non-persistent manipulation affected or connected module context.
Request Method(s):
[+] GET
Vulnerable File(s):
[+] index.php
Vulnerable Parameter(s):
[+] c
[+] m
Proof of Concept (PoC):
=======================
The client-side vulnerability can be exploited by remote attackers and local low privileged application user account with low or medium user interaction.
For security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue.
Dork(s):
Powered by phpwind v9.0 ©2003-2103 phpwind.com
Example: PoC
http://localhost:8080/index.php?c=attachaeejn[XSS PAYLOAD]Eromv2&a=delete&_json=1
http://localhost:8080/index.php?c=postu0rtp[XSS PAYLOAD]elgkz2uswpta&a=doadd&_json=1&fid=2
&atc_title=ouioyiuhiwaewe&atc_content=waewaea&pid=&tid=[XSS PAYLOAD]&special=default&reply_notice=1&csrf_token=
http://localhost:8080/index.php?m=emotioneekt9[XSS PAYLOAD]jkggr&type=bbs&&_json=1
Exploitation: PoC
http://localhost:8080/index.php?c=attachaeejn%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eromv2&a=delete&_json=1
http://localhost:8080/index.php?c=postu0rtp%3cimg%20src%3da%20onerror%3dalert(document.cookie)%3elgkz2uswpta&a=doadd&_json=1
&fid=2&atc_title=ouioyiuhiwaewe&atc_content=waewaea&pid=&tid=&special=default&reply_notice=1&csrf_token=dbd759885d380349
http://localhost:8080/index.php?m=emotioneekt9%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Ejkggr&type=bbs&&_json=1
Reference(s):
http://localhost:8080/index.php
Solution - Fix & Patch:
=======================
The issue can be fixed if proper input validation will be taken in place for the c and m parameters in the index.php file.
Security Risk:
==============
The security risk of the cross site scripting web vulnerabilities in the phpwind web-application are estimated as medium.
Credits & Authors:
==================
Vibhuti R V Nath - http://www.vulnerability-lab.com/show.php?user=VibhutiNath
Disclaimer & Information:
=========================
The information provided in this advisory is provided as it is without any warranty. Vulnerability Lab disclaims all warranties,
either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-Lab
or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits
or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do
not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
We do not approve or encourage anybody to break any licenses, policies, deface websites, hack into databases or trade with stolen data.
Domains: www.vulnerability-lab.com www.vuln-lab.com www.vulnerability-db.com
Services: magazine.vulnerability-lab.com paste.vulnerability-db.com infosec.vulnerability-db.com
Social: twitter.com/vuln_lab facebook.com/VulnerabilityLab youtube.com/user/vulnerability0lab
Feeds: vulnerability-lab.com/rss/rss.php vulnerability-lab.com/rss/rss_upcoming.php vulnerability-lab.com/rss/rss_news.php
Programs: vulnerability-lab.com/submit.php vulnerability-lab.com/register.php vulnerability-lab.com/list-of-bug-bounty-programs.php
Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory.
Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other
media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and other
information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list, modify, use or
edit our material contact (admin@ or research@) to get a ask permission.
Copyright © 2019 | Vulnerability Laboratory - [Evolution Security GmbH]™