[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Exponent Slideshow XSS Vulnerability
- To: <bugtraq@xxxxxxxxxxxxxxxxx>
- Subject: Exponent Slideshow XSS Vulnerability
- From: Andrei Rimsa <rimsa@xxxxxxxx>
- Date: Wed, 7 Jul 2010 18:34:56 +0100
Title: Exponent Slideshow XSS Vulnerability
Vendor: Exponent
Product: Exponent CMS
Tested Version: 0.97.0
Threat Class: XSS
Severity: High
Remote: yes
Local: no
Discovered By: Andrei Rimsa Alvares
===== Description =====
The file "modules/slideshowmodule/slideshow.js.php" is prone to XSS
vulnerabilities. Multiple instance of variable $_GET['u'] gets outputted to the
page without proper sanitization.
===== Impact =====
Malicious java script code can be executed in the context of the affected web
site.
===== Proof of Concept =====
http://target/modules/slideshowmodule/slideshow.js.php?u=%3Cscript%3Ewindow.alert(String.fromCharCode(88,83,83));%3C/script%3E
===== Workaround =====
No workaround is available at the time.
===== Disclosure Timeline =====
June, 16 2010 - Vendor notification.
July, 07 2010 - No vendor reply. Public disclosure.
===== References =====
http://www.exponentcms.org
_________________________________________________________________
Hotmail: Powerful Free email with security by Microsoft.
https://signup.live.com/signup.aspx?id=60969