Summary
This host is running Pagekit CMS and is
prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote
attackers to execute arbitrary script code in a user's browser session within the trust relationship between their browser and the server, and redirect a victim from the intended legitimate web site to an arbitrary web site of the attacker's choice.
Impact Level: Application
Solution
No solution or patch is available as of
30th January, 2015. Information regarding this issue will be updated once the solution details are available. For updates refer to http://www.pagekit.com
Insight
Multiple errors exists due to,
- The application does not validate the 'logout' parameter upon submission to the index.php script.
- The 'index.php' script does not validate input passed via the URL or the referer header before returning it to users.
Affected
YOOtheme Pagekit CMS version 0.8.7
Detection
Send a crafted data via HTTP GET
request and check whether it redirects to the arbitrary website.
References
Severity
Classification
-
CVE CVE-2014-8069, CVE-2014-8070 -
CVSS Base Score: 6.8
AV:N/AC:M/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- 7Media Web Solutions EduTrac Directory Traversal Vulnerability
- Adobe ColdFusion Multiple Full Path Disclosure Vulnerabilities
- Allegro RomPager HTTP Referer Header Cross Site Scripting Vulnerability
- Adobe ColdFusion Multiple Vulnerabilities-03 May-2014
- Annuaire PHP 'sites_inscription.php' Cross Site Scripting Vulnerability