GeniXCMS XSS Vulnerabilities Jun 22 2015 02:50AM
apparitionsec gmail com
[+] Credits: John Page ( hyp3rlinx )

[+] Domains: hyp3rlinx.altervista.org

[+] Source: http://hyp3rlinx.altervista.org/advisories/AS-GENIXCMS0621.txt


GeniXCMS v0.0.3 is a PHP based content management system

Advisory Information:
Multiple persistent & reflected XSS vulnerabilities

Vulnerability Details:
GeniXCMS v0.0.3 is vulnerable to persistent and reflected XSS

XSS Exploit code(s):

Persistent XSS:

1-content input field
content injected XSS will execute after posting is published

2-title input field
title injected XSS will execute immediate.

Relected XSS:
posts&q=1'<script>alert('XSS By Hyp3rlinx')</script>

Disclosure Timeline:
Vendor Notification: NA
June 21, 2015 : Public Disclosure

Severity Level:


Request Method(s): [+] GET & POST

Vulnerable Product: [+] GeniXCMS 0.0.3

Vulnerable Parameter(s): [+] q, content & title

Affected Area(s): [+] index.php


[+] Disclaimer
Permission is hereby granted for the redistribution of this advisory, provided that
it is not altered except by reformatting it, and that due credit is given. Permission is
explicitly given for insertion in vulnerability databases and similar, provided that
due credit is given to the author. The author is not responsible for any misuse of the
information contained herein and prohibits any malicious use of all security related
information or exploits by the author or elsewhere.


[ reply ]


Privacy Statement
Copyright 2010, SecurityFocus