ExpressionEngine Persistent Cross-Site Scripting

2009.03.24
Credit: Adam Baldwin
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

nGenuity Information Services - Security Advisory Advisory ID: NGENUITY-2009-003 - ExpressionEngine Persistent Cross-Site Scripting Application: ExpressionEngine (1.6.4 (possibly earlier)-1.6.6) Vendor: EllisLab, INC Vendor website: http://www.expressionengine.com <http://www.transparent-tech.com/> Author: Adam Baldwin (adam_baldwin_at_ngenuity-is&#46;com) I. BACKGROUND "ExpressionEngine is a flexible, feature-rich content management system that empowers thousands of individuals, organizations, and companies around the world to easily manage their website." [1] II. DETAILS While setting a display avatar in the user control panel, avatar names are not validated for invalid input. User input is then rendered, unaltered into any browser that displays that members avatar. Here is an example of an avatar name that will display an alert to any visitor that views the users profile. chococat.gif"><script>alert('XSS')</script><div "a III. REFERENCES [1] - http://expressionengine.com/ IV. VENDOR COMMUNICATION 1.17.2009 - Vendor Notified 1.18.2009 - Initial vendor communication (details requested) 1.18.2009 - Steps to reproduce provided to vendor 1.21.2009 - Vendor response with public update "shortly" 1.22.2009 - Vendor releases 1.6.7 which addresses this vulnerability Copyright (c) 2008 nGenuity Information Services, LLC

References:

http://seclists.org/fulldisclosure/2009/Mar/0316.html


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top