Name : XSS Vulnerabilities in RuubikCMS
Software : RuubikCMS 1.1.1 and possibly below.
Vendor Homepage :
Vulnerability Type : Cross-Site Scripting
Severity : Critical
Researcher : Omar Kurt
Advisory Reference : NS-13-015

RuubikCMS is an open source website content management tool which is designed to be user-friendly for both the end-user and the webmaster. In our vision the end-user should be able to create and update webpages quickly without learning any special skills (no coding, HTML or CSS). For the webmaster a RuubikCMS site should be easy to install and manage but still flexible to allow modifications. In any case installing should be so easy that a designing oriented webmaster doesn't need any coding or database skills.

RuubikCMS is affected by XSS vulnerabilities in version 1.1.1.

Example PoC urls are as follows :

  • XSS Vulnerabilities (POST - params: mother, ordernum, creator)
    creator='"--></style></script><script>alert(0x00033F)</script> (POST - params: ordernum)
    ordernum=/" stYle="x:expre/**/ssion(alert(9))

You can read the full article about Cross-Site Scripting vulnerabilities from here :

No patch released.

Advisory Timeline
10/07/2013 - First Contact - No Response
24/07/2013 - Second Contact - No response
11/12/2013 - Vulnerability Released

It has been discovered on testing of Netsparker Web Application Security Scanner.

About Netsparker
Netsparker® can find and report security issues such as SQL Injection and Cross-site Scripting (XSS) in all web applications regardless of the platform and the technology they are built on. Netsparker's unique detection and exploitation techniques allows it to be dead accurate in reporting hence it's the first and the only False Positive Free web application security scanner.