QuickCMS contains two vulnerabilities that allow an attacker to perform cross-site scripting (XSS) and cross-site request forgery (CSRF) attacks. This allows a remote attacker to arbitrarily execute HTML and scripts within the context of the user's browser session (XSS), and perform various actions via HTTP requests (CSRF).
QuickCMS 5.4 and possibly other versions
Input sent via URL to admin.php is not properly sanitized, allowing for attacker-controlled HTML or script returned to the user to execute within the context of the browser.
Cross-Site Request Forgery
Attackers may send crafted HTTP requests to QuickCMS, which then fails to validate the requests. These requests may allow an attacker to change administrator credentials, when an already logged-on user visits a specially crafted web page designed to attack this vulnerability.
BeyondTrust Prevention and Detection:
BeyondTrust's Retina® Network Security Scanner scans devices to detect for this vulnerability.
- 33668 - QuickCms 5.4 and Prior Multiple Vulnerabilities (Zero-Day)
No mitigations are currently available.