lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <200411261053.06333.cb-lse@ifrance.com>
Date: Fri, 26 Nov 2004 10:53:06 +0100
From: Cyrille Barthelemy <cb-lse@...ance.com>
To: full-disclosure@...ts.netsys.com, bugtraq@...urityfocus.com
Subject: phpCMS <= 1.2.1 Xss Vulnerability, Information disclosure


Title: phpCMS <= 1.2.1 Xss Vulnerability, Information disclosure
Affects: 
  - <= 1.2.1
Effect: Cross Site Attack (session hijacking, ...)
Id: cbsa-0006
Release Date: 2004/11/26
Author: Cyrille Barthelemy <cb-publicbox@...ance.com>


-- 1. Introduction
------------------------
phpCMS is a content management system, easily configurable with no particular
dependency and very flexible. Please go to [1] to read a complete description 
of the project. The last version, 1.2.1, has been released on 2004, november 
22.

-- 2. Problem
------------------
An implementation error in the validation of the user input lead to an Xss 
vulnerability allowing a user to create cross site attacks, and also disclose 
information about the  server configuration when phpCMS is configured in 
non-stealth mode with debug mode activated.
Example of exploitation :
http://[somehost]/parser/parser.php?file=<script>alert(document.cookie)</script>


The error page display the input supplied by the user, without filtering, and 
the full path to the phpCMS root directory.
Example of exploitation : 
http://[somehost]/parser/parser.php?file=donotexist
=>
phpCMS 1.2.1
Error: 07: could not find file for parsing.
/var/www/localhost/htdocsdonotexists/index.htm
^^^^^^^^^^^^^^^^^^^^^^^^^


-- 3. Solution
------------------
Upgrade to the next version 1.2.1.pl1, available at : 
http://www.phpcms.de/download/index.en.html

_DO NOT_ run your configuration in debug mode with untrusted access.
_DO_ run in file stealth mode.


-- 4. References
---------------------
[1] phpCMS web site
    http://www.phpcms.de/


-- 5. History
----------------
- 2004/11/24 : vulnerability discovered
- 2004/11/24 : vendor notified
- 2004/11/25 : vendor response
- 2004/11/25 : fix released

-- 6. Contact information
----------------------------------
Cyrille Barthelemy <cb-publicbox@...ance.com>
Web Site : http://www.cyrille-barthelemy.com

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ