EasyDNNnews Cross Site Scripting

2016.01.14
Credit: Peter Lapp
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79

Details ======= Product: EasyDNNnews Vulnerability: Reflected XSS Author: Peter Lapp, lappsec () gmail com CVE: None Vulnerable Versions: <7.5 Fixed Version: 7.5 Summary ======= >From the vendor's website: "EasyDNNnews is a very powerful DotNetNuke module that enables non-technical users to publish and manage articles, news, press releases, stories and editorials." During an engagement it was discovered that reflected XSS could be achieved in two locations by appending a bogus GET parameter that contained JavaScript in the parameter name. After alerting EasyDNNsolutions of the vulnerability, they informed me that one of the vulnerabilities had already been fixed and the other would be fixed in an upcoming release. Example ================= http://targetsite.com/Blog/Details/blog-post?%3C/script%3E%3Cscript%3Ealert%280%29%3C/script%3E=1 Solution ======== Upgrade to 7.5 Timeline ======== 08/31/15 - Contacted EasyDNNnews about the vulnerability. 09/01/15 - Vendor responds and says the first vulnerability has been fixed and the other will be in the next release, which was 7.5.


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top