Description
Qool CMS contains multiple persistent cross-site scripting vulnerabilities in several administrative scripts where POST parameters are not properly sanitized before being stored and returned to users. Attackers can inject malicious JavaScript code through parameters like 'title', 'name', 'email', 'username', 'link', and 'task' in endpoints such as addnewtype, addnewdatafield, addmenu, addusergroup, addnewuserfield, adduser, addgeneraldata, and addcontentitem to execute arbitrary scripts in administrator browsers.
Problem types
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Product status
References
www.exploit-db.com/exploits/24627 (ExploitDB-24627)
www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5133.php (Vulnerability Advisory)
www.vulncheck.com/...nt-cross-site-scripting-vulnerabilities (VulnCheck Advisory: Qool CMS Multiple Persistent Cross-Site Scripting Vulnerabilities)