Date: Fri, 9 Sep 2011 13:50:44 -0400 (EDT) From: Josh Bressers <bressers@...hat.com> To: oss-security@...ts.openwall.com Cc: "Steven M. Christey" <coley@...us.mitre.org> Subject: Re: CVE Request -- Zikula (v1.3.x) -- XSS flaw due improper sanitization of 'themename' parameter by setting default, modifying and deleting themes Please use CVE-2011-3352 Thanks. -- JB ----- Original Message ----- > Hello Josh, Steve, vendors, > > it was found that the Zikula web application framework did not > properly sanitize the 'themename' parameter, while setting particular > theme as a default one, modifying the theme or deleting it. A remote > attacker, with Zikula administrator privilege, could use this flaw to > execute arbitrary HTML or web script code in the context of the > affected website. > > References: >  http://www.securityfocus.com/archive/1/519565/30/0/threaded >  https://www.htbridge.ch/advisory/xss_in_zikula.html >  https://bugzilla.redhat.com/show_bug.cgi?id=736707 > > Relevant upstream patch: >  > https://github.com/zikula/core/commit/c27dc3ddce8c9ff519ed57397e3bdf8f281aade6 > > Vulnerable Zikula versions: Development versions prior to patch . > Not vulnerable versions: Zikula v1.2.7 (stable). Doesn't contain > code in question yet. > > Provided PoC (from , ): > ============================= > http://host/index.php?module=theme&type=admin&func=setasdefault&themename=%3Cscript%3Ealert%28docu > ment.cookie%29%3C/script%3E > > Could you allocate a CVE id for this? > > Thanks && Regards, Jan. > -- > Jan iankko Lieskovsky / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.