Evolution Script CMS v5.3 - Cross Site Scripting Vulnerability

Published: 2017-06-13 09:59:56

CVSS Base Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N

Detection Type:
Remote Banner

Summary:
Evolution Script CMS is vulnerable to Cross Site Scripting Vulnerability.

Detection Method:
Checks if a vulnerable version is present on the target host.

Technical Details:
The cross site vulnerability is located in the 'status' parameter of the 'Ticket Support' module.

Impact:
Remote attackers are able to inject own malicious script codes via GET method request.

Affected Versions:
Evolution Script CMS Version 5.3

Recommendations:
No known solution was made available for at least one year since the disclosure of this vulnerability. Likely none will be provided anymore. General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one. A workaround is to parse or escape the status parameter content. Disallow the usage of special chars to prevent further script code injection attacks. Parse the ticket support content list and include an own exception-handling.

Solution Type:
Vendor will not fix

References:

http://seclists.org/fulldisclosure/2017/Jun/14

Search
Severity
Medium
CVSS Score
4.3

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.