← Advisories

Family Connections CMS 2.3.2 (POST) Stored XSS And XML Injection

Medium
Advisory ID
ZSL-2011-5004
Release Date
25 March 2011
Vendor
Ryan Haudenschilt - http://www.familycms.com
Affected Version
2.3.2
CVE
N/A
Tested On
Tested on: Microsoft Windows XP Professional SP3 (EN), Apache 2.2.14 (Win32), PHP 5.3.1, MySQL 5.1.41
Summary

Family Connections is an open source content management system. It makes creating a private, family website easy and fun.

Description

FCMS suffers from a stored XSS vulnerability (post-auth) in messageboard.php script thru the 'subject' post parameter. XML Inj. lies in the /inc/getChat.php script with 'users' get parameter with no args, and post parameter 'message'.

/inc/getChat.php ---------------- 30: // New Chat text 31: if (isset($_POST['message']) && $_POST['message'] != '') { 32: $sql = "INSERT INTO fcms_chat_messages(chat_id, user_id, user_name, message, post_time) 33: VALUES (1, " . cleanInput($_POST['user_id']) . ", '" . cleanInput($_POST['name']) . "', '" . cleanInput($_POST['message']) . "', NOW())"; ... 46: //Create the XML response. 47: $xml = '<?xml version="1.0" ?><root>'; 48: // Get Users Online 49: if (isset($_GET['users'])) 50: // Timezone stuff 51: $sql = "SELECT `timezone` FROM `fcms_user_settings` WHERE `user` = ".cleanInput($_GET['user_id']); ... 107: $xml .= '<text>' . htmlspecialchars($message_array['message']) . '</text>';
Proof of Concept
Disclosure Timeline
N/A
Credits
Vulnerability discovered by Gjoko Krstic
High five to Michael Brooks
References
Changelog
25.03.2011Initial release
26.03.2011Added reference [2], [3] and [4]
28.03.2011Added reference [5] and [6]
30.03.2011Changed title, PoC file and Credits
02.04.2011Added reference [7]