<<< Croogo 2.0.0 Multiple Stored XSS Vulnerabilities Vendor: Fahad Ibnay Heylaal Product web page: http://www.croogo.org Affected version: 2.0.0 Summary: Croogo is a free, open source, content management system for PHP, released under The MIT License. It is powered by CakePHP MVC framework. Desc: Croogo version 2.0.0 suffers from multiple stored cross-site scripting vulnerabilities. Input passed to several POST parameters is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. Tested on: Apache/2.4.7 (Win32) PHP/5.5.6 MySQL 5.6.14 Vulnerability discovered by Gjoko 'LiquidWorm' Krstic Zero Science Lab - http://www.zeroscience.mk Macedonian Information Security Research And Development Laboratory Advisory ID: ZSL-2014-5201 Advisory URL: http://zeroscience.mk/en/vulnerabilities/ZSL-2014-5201.php Vendor: http://blog.croogo.org/blog/croogo-210-released 26.07.2014 >>> ------------------------ (XSS #1) -------- POST parameters: - data[Contact][title] ------------------------
" />
------------------------ (XSS #2) -------- POST/PUT parameters: - data[Block][title] - data[Block][alias] ------------------------
" /> " />
------------------------ (XSS #3) -------- POST parameters: - data[Region][title] ------------------------
" />
------------------------ (XSS #4) -------- POST parameters: - data[Menu][title] - data[Menu][alias] ------------------------
" /> " />
------------------------ (XSS #5) -------- POST parameters: - data[Link][title] ------------------------
" />
# Iranian Exploit DataBase = http://IeDb.Ir [2014-10-15]