← Advisories

SkaDate Lite 2.0 Multiple XSRF And Persistent XSS Vulnerabilities

Medium
Advisory ID
ZSL-2014-5197
Release Date
30 July 2014
Vendor
Affected Version
2.0 (build 7651) [Platform version: 1.7.0 (build 7906)]
Tested On
CentOS Linux 6.5 (Final), nginx/1.6.0, PHP/5.3.28, MySQL 5.5.37
Summary

SkaDate Lite is a new platform that makes it easy to start online dating business in just a few easy steps. No programming or design knowledge is required. Install the solution, pick a template, and start driving traffic to your new online dating site.

Description

SkaDate Lite version 2.0 suffers from multiple cross-site request forgery and stored xss vulnerabilities. The application allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site. Input passed to several POST parameters is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

Proof of Concept
Disclosure Timeline
23.07.2014Vulnerability discovered.
28.07.2014Vendor contacted.
28.07.2014Vendor responds asking more details.
28.07.2014Sent details to the vendor.
29.07.2014Vendor will fix the issues in the next release.
30.07.2014Public security advisory released.
Credits
Vulnerability discovered by Gjoko Krstic
References
Changelog
30.07.2014Initial release
05.10.2014Added reference [3], [4], [5], [6], [7], [8], [9], [10] and [11]
02.12.2014Added reference [12] and [13]