Content2Web 1.0.1 - Multiple Input Validation Vulnerabilities
Author: Security Tester
type: webapps
platform: php
port:
date_added: 2005-09-16
date_updated: 2013-06-18
verified: 1
codes: OSVDB-19488
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/14862/info
Content2Web is affected by multiple input validation vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input.
An attacker can exploit this lack of sanitization to perform SQL injection attacks, cross-site scripting attacks and include local PHP files. It may also be possible to include remote PHP files as well; this has not been confirmed.
The consequences of these attacks vary from a compromise of the system, the execution of arbitrary code and the theft of cookie-based authentication credentials, all in the context of the Web server process.
SQL Injection
-------------
http://www.example.com/index.php?show=c2w_news%2Ephp&cat=news_archiv
XSS
---
http://www.example.com/index.php?show=%3C/textarea%3E%3Cscript%3Ealert(%27XSS
aka %27);%3C/script%3E&site=impressum
File Inclusion
--------------
http://www.example.com/index.php?show=[file]&cat=news_archiv&start=1