# Exploit Title: [ruubikcms v1.1.1 Stored XSS] # Google Dork: [powered by ruubikcms] # Date: [2013-6-5] # Exploit Author: [expl0i13r] # Vendor Homepage: [http://www.ruubikcms.com/] # Software Link: [http://www.ruubikcms.com/ruubikcms/download.php?f=ruubikcms111.zip] # Version: [1.1.1] # Tested on: [Windows 7] # Contact: expl0i13r@gmail.com Description: ------------- RuubikCMS is an open source website content management tool which is designed to be user-friendly for both the end-user and the webmaster. ruubikcms v1.1.1 suffers from Stored XSS vulnerability, when parsing user input to the 'name' parameter via POST method through '/ruubikcms/ruubikcms/cms/index.php'. Attackers can exploit these weaknesses to execute arbitrary HTML and script code in a user's browser session. Tested on : Windows 7 Browsers : Chrome,Internet Explorer, Firefox POC of the vulnerabilities : ----------------------------- Stored XSS Vulnerable URL's ---------------------------- http://127.0.0.1/ruubikcms/ruubikcms/cms/index.php [vulnerable : name] http://127.0.0.1/ruubikcms/ruubikcms/cms/extranet.php?p=member-area [vulnerable : name] http://127.0.0.1/ruubikcms/ruubikcms/cms/sitesetup.php [Vulnerable : name , siteroot] http://127.0.0.1/ruubikcms/ruubikcms/cms/users.php?role=5&p=test [Vulnerable : firstname , lastname] p@yl0ad : "> Example: Pagemanagement > Page name 1. Enter pAyl0ad : "> in: "Page management" > "Page name" textbox 2. Refresh page and click on Free Pages and p0p up will come. 3. Also Click on tab "News" which will load our injected XSS code , it will be available in drop down menu : News > Link to page (optional) # blackpentesters.blogspot.com [2013-6-5] # infotech-knowledge.blogspot.com