← Advisories

Manx cms.xml 1.0.1 Multiple HTTP Response Splitting Vulnerabilities

Medium
Advisory ID
ZSL-2011-5059
Release Date
28 November 2011
Vendor
Affected Version
1.0.1
CVE
N/A
Tested On
Microsoft Windows XP Professional SP3 (EN), Apache 2.2.21, MySQL 5.5.16, PHP 5.3.8
Summary

Manx is a Content Management System that uses xml text files to store the page contents, instead of a mysql database.

Description

Input passed to the POST parameter 'editorChoice' in 'admin_blocks.php' and 'admin_pages.php' and the POST parameter 'theme' in 'admin_css.php', 'admin_js.php' and 'admin_templates.php' is not properly sanitised before being returned to the user. This can be exploited to insert arbitrary HTTP headers, which are included in a response sent to the user.

header("Location: " . basename($_SERVER['PHP_SELF']) . "?theme=" . $_POST['theme']); header("Location: " . basename($_SERVER['PHP_SELF']) . "?fileName=" . $fileName . "&editorChoice=" . $_POST['editorChoice']);
Proof of Concept
Disclosure Timeline
03.12.2011Vendor releases patch (http://manx.jovascript.com/downloads.php).
Credits
Vulnerability discovered by Gjoko Krstic
References
Changelog
28.11.2011Initial release
29.11.2011Added reference [1]
30.11.2011Added reference [2]
01.12.2011Added reference [3], [4], [5], [6], [7], [8] and [9]
03.12.2011Added vendor status