XSS Vulnerability in KajonaCMS

Information

Advisory by Netsparker (now Invicti)
Name: XSS Vulnerability in KajonaCMS
Software: KajonaCMS v4 and possibly below.
Vendor Homepage: http://www.kajona.de/
Vulnerability Type: Cross-site Scripting
Severity: Critical
Researcher: Omar Kurt
Advisory Reference: NS-14-023

Description

Kajona is a content management framework based on PHP5 and published as an open-source project under the LGPL license. The roots of the project are going back to 2004 as collected programming solutions where combined into a library. The idea of a web content management framework was born – followed by version 2.0 in 2005 and 2.1 in the beginning of 2006. Version 3.0 was published with a complete code rewrite in 2006.

Details

KajonaCMS is affected by XSS vulnerability in version v4.
KajonaCMS PoC urls are as follows:

  • Cross-site Scripting
    http://example.com/index.php?page=downloads&systemid=';"--></style></scRipt><scRipt>alert(0x0001EE)</scRipt>&action=mediaFolder (Querystring)

Learn more about Cross-site Scripting vulnerabilities:

Solution

https://github.com/kajona/kajonacms/commit/8f1b18150cc2a8f27c96d9c4f94a81022fbb61e3
https://github.com/kajona/kajonacms/commit/4a07f949c171da6aa9a6e6c19421b0df16297180

Advisory Timeline

05/06/2014 – First Contact
07/06/2014 – Second Contact
08/06/2014 – Vulnerability fixed
23/06/2014 – Advisory released

Credits

It has been discovered on testing of Invicti Web Application Security Scanner.

About Invicti

Invicti® can find and report security issues such as SQL Injection and Cross-site Scripting (XSS) in all web applications regardless of the platform and the technology they are built on. Invicti’s unique detection and exploitation techniques allows it to be dead accurate in reporting hence it’s the first and the only False Positive Free web application security scanner.