Summary
This host is running Pagekit CMS and is
prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote
attackers to execute arbitrary script code in a user's browser session within the trust relationship between their browser and the server, and redirect a victim from the intended legitimate web site to an arbitrary web site of the attacker's choice.
Impact Level: Application
Solution
No solution or patch is available as of
30th January, 2015. Information regarding this issue will be updated once the solution details are available. For updates refer to http://www.pagekit.com
Insight
Multiple errors exists due to,
- The application does not validate the 'logout' parameter upon submission to the index.php script.
- The 'index.php' script does not validate input passed via the URL or the referer header before returning it to users.
Affected
YOOtheme Pagekit CMS version 0.8.7
Detection
Send a crafted data via HTTP GET
request and check whether it redirects to the arbitrary website.
References
Severity
Classification
-
CVE CVE-2014-8069, CVE-2014-8070 -
CVSS Base Score: 6.8
AV:N/AC:M/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- Apache Tomcat HTTP BIO Connector Information Disclosure Vulnerability
- Adobe ColdFusion Multiple Cross Site Scripting Vulnerabilities
- @Mail WebMail Email Body HTML Injection Vulnerability
- Apache Archiva Home Page Cross-Site Scripting vulnerability
- 11in1 Cross Site Request Forgery and Local File Include Vulnerabilities