Document Title: =============== Social Engine v4.2.5 - Multiple Web Vulnerabilities References (Source): ==================== http://www.vulnerability-lab.com/get_content.php?id=672 Release Date: ============= 2012-07-30 Vulnerability Laboratory ID (VL-ID): ==================================== 672 Common Vulnerability Scoring System: ==================================== 3 Abstract Advisory Information: ============================== A Laboratory Researcher [X-Cisadane] discovered multiple Web Vulnerabilities in the Social Engine v4.2.5 web application. Vulnerability Disclosure Timeline: ================================== 2012-07-31: Public or Non-Public Disclosure Discovery Status: ================= Published Exploitation Technique: ======================= Remote Severity Level: =============== Low Technical Details & Description: ================================ 1.1 Multiple persistent input validation vulnerabilities are detected in the Social Engine v4.2.5 web application. The bug allows an attackers to implement/inject malicious script code on the application-side (persistent). The persistent vulnerabilities are located in the add- new videos and classiefieds module with the bound vulnerable tag (keywords) parameter. Successful exploitation of the vulnerability can lead to persistent session hijacking (manager/admin) or stable (persistent) context manipulation. Exploitation requires low user inter action but a privileged user account. Vulnerable Module(s): [+] Add New Video [+] Add New Classfields Affected Module(s): [+] Videos Listing Page [+] Classfields Listing Page Vulnerable Parameter(s): [+] Tags (keywords) 1.2 A non persistent cross site scripting vulnerability is detected in the Social Engine v4.2.5 web application. The vulnerability allows remote attackers to hijack website customer, moderator or admin sessions with medium or high required user inter action or local low privileged user account. The bug is located in the signup (profile) module with the bound vulnerable name and address parameters. Successful exploitation can result in account steal, client side phishing & client-side content request manipulation. Exploitation requires medium or high user inter action & without privileged web application user account. Vulnerable Module(s): [+] Profile - Signup Vulnerable Parameter(s): [+] Name & Address Proof of Concept (PoC): ======================= 1.1 The persistent vulnerability can be exploited by remote attackers with low required user inter action & low privileged application user account. For demonstration or reproduce ... - In the Post New Video Page (http://127.0.0.1:8080/videos/create) Information: Copy & Paste persistent malicious script coe (js/html) into the Tags (keywords) field and save the context - In the Post New Classfields Listing Page (http://127.0.0.1:8080/classifieds/create) Information: Copy & Paste persistent malicious script coe (js/html) into the Tags (keywords) field and save the context Picture : http://i47.tinypic.com/2ptcv29.png Picture : http://i50.tinypic.com/14soaci.png PoC: