A local file include vulnerability is detected in the CMSQLITE v1.3.2 Content Management System. The vulnerability allows a local privileged user account to include and load local system files. The vulnerability is located in the mediaAdmin.php file with the bound vulnerable d parameter request. Successful exploitation of the vulnerability results in a web server compromise via file load (webshell) or information disclosure via local system file include.
Vulnerable Module(s):
[+] mediaAdmin.php
Vulnerable Parameter(s):
[+] d=
A client side cross site scripting vulnerability is detected in the CMSQLITE v1.3.2 Content Management System. The vulnerability allows an attacker (remote) to hijack customer/moderator/admin sessions with medium required user inter action. The security vulnerability is located in the mediaAdmin.php file with the bound vulnerable d parameter request. Successful exploitation can result in account steal, client side phishing attacks, client side malware load, external redirects or stable client side module context manipulation.
Vulnerable Module(s):
[+] mediaAdmin.php
Vulnerable Parameter(s):
[+] ?id=
Multiple client side cross site request forgery vulnerabilities are detected in the CMSQLITE v1.3.2 Content Management System.
The vulnerability allows an attacker (remote) to form malicious webpages to execute application functions on client side requests with not expired application session. The security vulnerabilities are located in the deleteMenu, deleteCategory,
deleteArticle, addMenu, addCategory & addArticle modules. Successful exploitation can result in forced account add/delete and category/article add/delete via not expired application session.
Proof of Concept:
The local file include vulnerability can be exploited by local privileged user account without required user inter action.
The client side cross site scripting vulnerability can be exploited by remote attackers without privileged application user account and with low or medium required user inter action. For demonstration or reproduce ...
Review: id
<form name="frm_UploadPic" enctype="multipart/form-data"
action="anyfile.php?d="><[MALICIOUS CLIENT SIDE SCRIPT CODE!]">"
method="post">
<input
The client side cross site request forgery vulnerabilities can be exploited by remote attackers without privileged application user account and with medium or high required user inter action. For demonstration or reproduce ...