← Advisories

Hotaru CMS 1.4.2 SITE_NAME Parameter Stored XSS Vulnerability

Medium
Advisory ID
ZSL-2011-5057
Release Date
13 November 2011
Vendor
Affected Version
1.4.2
Tested On
Microsoft Windows XP Professional SP3 (EN), Apache 2.2.21, MySQL 5.5.16, PHP 5.3.8
Summary

Hotaru CMS is an open source, PHP platform for building your own websites. With flexible plugins and themes, you can make any site you like.

Description

The CMS suffers from multiple XSS vulnerabilities. Input thru the POST parameters 'SITE_NAME' (stored), 'return' (reflected) and the GET parameter 'search' (reflected) thru Hotaru.php, are not sanitized allowing the attacker to execute HTML code into user's browser session on the affected site.

Proof of Concept
Disclosure Timeline
N/A
Credits
Vulnerability discovered by Gjoko Krstic
References
Changelog
13.11.2011Initial release
14.11.2011Added reference [1], [2] and [3]
15.11.2011Added reference [4], [5], [6], [7] and [8]
12.01.2012Added reference [9], [10] and [11]