[MajorSecurity SA-077]XINHA Editor Plugin "ExtendedFileManager" - Cross
Site Scripting Issue
Product: XINHA Editor Plugin "ExtendedFileManager"
Discovered by: David Vieira-Kurz of MajorSecurity
XINHA Editor 0.96.1 Plugin "ExtendedFileManager"
Prior versions may also be vulnerable
"Xinha (pronounced like Xena, the Warrior Princess) is a powerful
WYSIWYG HTML editor component that works in all current browsers." -
We at MajorSecurity have discovered some vulnerabilities in one of the
Plugins in XINHA WYSIWYG Editor version 0.96.1, which can be exploited
by malicious people to conduct cross-site scripting attacks. Input
passed directly to the "mode" parameter in "backend.php" of the
"ExtendedFileManager" Plugin is not properly sanitised before being
stored and returned to the user. This can be exploited to execute
arbitrary HTML and script code in a user's browser session in context of
an affected site.
Web applications should never trust on user generated input and
therefore sanatize all input. Edit the source code to ensure that input
is properly sanitised.
MajorSecurity is a German penetrationtest and sourcecode audit company
which focuses on application security. We offer professional source code
audit, penetrationstest and pci dss compliance tests. Visit us at