CM3 AcoraCMS Multiple XSS, CSRF and Open Redirect Vulnerabilities

Summary
This host is installed with CM3 AcoraCMS and is prone to multiple XSS, CSRF and url redirection vulnerabilities.
Impact
Successful exploitation will allow attackers to redirect victim from the intended legitimate web site to an arbitrary web site, trick the users into performing an unspecified action in the context of their session with the application and execute arbitrary script code in a user's browser session in context of an affected site. Impact Level: Application
Solution
No solution or patch is available as of 30th January, 2015. Information regarding this issue will be updated once the solution details are available. For updates refer to http://www.ddsn.com/knowledge-base/cm3-acora-cms.aspx
Insight
Multiple flaws are due to, - Insufficient validation of user-supplied input via 'username', 'url', 'qstr' passed to login/default.asp - Insufficient validation of the 'l' parameter upon submission to track.aspx script. - insufficient measures for confirmation of sensitive transactions.
Affected
CM3 Acora CMS 6.0.6/1a, 6.0.2/1a, 5.5.7/12b, 5.5.0/1b-p1, and possibly other versions
Detection
Send a crafted data via HTTP GET request and check whether it is able read the cookie or not.
References