XOOPS Multiple Cross-Site Scripting Vulnerabilities

2009-07-31 / 2009-08-01
Credit: Lists
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


CVSS Base Score: 4.3/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

XOOPS Multiple Cross-Site Scripting Vulnerabilities - Security Advisory - SOS-09-005 Release Date. 31-Jul-2009 Vendor Notification Date. 15-Jun-2009 Product. XOOPS Platform. Independent Affected versions. 2.3.3 (verified), possibly othersSeverity Rating. Medium Impact. Cookie/credential theft, impersonation, loss of confidentialityAttack Vector. Remote Solution Status. Vendor patch CVE reference. Not yet assigned Details. XOOPS is a content management system written in PHP. During an application penetration test Sense of Security identified that Input passed to the "op" parameter of viewpmsg.php, and in the query string of user.php are vulnerable to Cross-Site Scripting vulnerabilities. This occurred as a result of the application not properly filtering HTML tags which allowed malicious JavaScript to be embedded. When input is incorrectly validated and not properly sanitised and then displayed in a web page, attackers can trick users into viewing the web page and causing malicious code to be executed. Proof of Concept. http://lP/xoops-2.3.3/htdocs/modules/pm/viewpmsg.php?op='"><script>alert('vulnerable')</script> <link id=' http://lP/xoops-2.3.3/htdocs/modules/profile/user.php?"><script>alert('vulnerable')</script> Solution. Vendor patch Discovered by. SOS Labs About us. Sense of Security is a leading provider of IT security and risk management solutions. Our team has expert skills in assessment and assurance, strategy and architecture, and deployment through to ongoing management. We are Australia's premier application security consultancy and trusted IT security advisor to many of the countries largest organisations. Sense of Security Pty Ltd Level 3, 66 King St Sydney NSW 2000

References:

http://xoops.svn.sourceforge.net/viewvc/xoops/XoopsCore/trunk/htdocs/modules/pm/viewpmsg.php?r1=2621&r2=3292
http://xoops.svn.sourceforge.net/viewvc/xoops/XoopsCore/trunk/htdocs/modules/pm/viewpmsg.php?view=log#rev3292
http://www.senseofsecurity.com.au/advisories/SOS-09-005.pdf
http://www.securitytracker.com/id?1022641
http://www.securityfocus.com/bid/35895
http://secunia.com/advisories/36109
http://osvdb.org/56638191d
http://marc.info/?l=bugtraq&m=124905075425380&w=2
http://www.senseofsecurity.com.au/research/it-security-advisories.php


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top