Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 19 Oct 2017 09:57:45 +0530
From: Dollar Strike <dollarstrike163@...il.com>
To: oss-security@...ts.openwall.com
Subject: Re: Stored XSS vulnerability in ILIAS <= 5.2.8 and <= 5.1.20

I just skimmed through the fix, I am trying to understand how does this
function if (is_int(strpos(strtolower($a_val), "javascript"))) sanitize the
input as below payloads


1. %22%7D%5D%7D%29%3Balert%280%29%3B     --------> "}]});alert(0);
2. %27%27%3B%21--%22%3CXSS%3E%3D%26%7B%28%29%7D  ---> '';!--"<XSS>=&{()}

On Wed, Oct 18, 2017 at 10:28 PM, <chbi@...i.eu> wrote:

>
> > A stored XSS vulnerability in the media object component allows an
> > authenticated user to inject JavaScript to gain administrator privileges.
> >
> >
> > Fix:
> > https://github.com/ILIAS-eLearning/ILIAS/commit/
> b2a4660afec1e87d41c83c8e381f549bc6dfc70f
> >
>
> CVE-2017-15538 has been assigned.
>
> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15538
>
>
> --
> chbi
> https://chbi.eu
>
> GPG: 3DE9 9187 4BE9 EAE6 3CA8  DC20 BA7B 93F9 9037 AE7E
>      https://chbi.eu/chbi.asc
>
>

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.