Date: Thu, 08 Sep 2011 15:19:13 +0200 From: Jan Lieskovsky <jlieskov@...hat.com> To: "Steven M. Christey" <coley@...us.mitre.org> CC: oss-security@...ts.openwall.com Subject: CVE Request -- Zikula (v1.3.x) -- XSS flaw due improper sanitization of 'themename' parameter by setting default, modifying and deleting themes Hello Josh, Steve, vendors, it was found that the Zikula web application framework did not properly sanitize the 'themename' parameter, while setting particular theme as a default one, modifying the theme or deleting it. A remote attacker, with Zikula administrator privilege, could use this flaw to execute arbitrary HTML or web script code in the context of the affected website. References:  http://www.securityfocus.com/archive/1/519565/30/0/threaded  https://www.htbridge.ch/advisory/xss_in_zikula.html  https://bugzilla.redhat.com/show_bug.cgi?id=736707 Relevant upstream patch:  https://github.com/zikula/core/commit/c27dc3ddce8c9ff519ed57397e3bdf8f281aade6 Vulnerable Zikula versions: Development versions prior to patch . Not vulnerable versions: Zikula v1.2.7 (stable). Doesn't contain code in question yet. Provided PoC (from , ): ============================= http://host/index.php?module=theme&type=admin&func=setasdefault&themename=%3Cscript%3Ealert%28docu ment.cookie%29%3C/script%3E Could you allocate a CVE id for this? Thanks && Regards, Jan. -- Jan iankko Lieskovsky / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.