lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <200411261053.06333.cb-lse@ifrance.com> Date: Fri, 26 Nov 2004 10:53:06 +0100 From: Cyrille Barthelemy <cb-lse@...ance.com> To: full-disclosure@...ts.netsys.com, bugtraq@...urityfocus.com Subject: phpCMS <= 1.2.1 Xss Vulnerability, Information disclosure Title: phpCMS <= 1.2.1 Xss Vulnerability, Information disclosure Affects: - <= 1.2.1 Effect: Cross Site Attack (session hijacking, ...) Id: cbsa-0006 Release Date: 2004/11/26 Author: Cyrille Barthelemy <cb-publicbox@...ance.com> -- 1. Introduction ------------------------ phpCMS is a content management system, easily configurable with no particular dependency and very flexible. Please go to [1] to read a complete description of the project. The last version, 1.2.1, has been released on 2004, november 22. -- 2. Problem ------------------ An implementation error in the validation of the user input lead to an Xss vulnerability allowing a user to create cross site attacks, and also disclose information about the server configuration when phpCMS is configured in non-stealth mode with debug mode activated. Example of exploitation : http://[somehost]/parser/parser.php?file=<script>alert(document.cookie)</script> The error page display the input supplied by the user, without filtering, and the full path to the phpCMS root directory. Example of exploitation : http://[somehost]/parser/parser.php?file=donotexist => phpCMS 1.2.1 Error: 07: could not find file for parsing. /var/www/localhost/htdocsdonotexists/index.htm ^^^^^^^^^^^^^^^^^^^^^^^^^ -- 3. Solution ------------------ Upgrade to the next version 1.2.1.pl1, available at : http://www.phpcms.de/download/index.en.html _DO NOT_ run your configuration in debug mode with untrusted access. _DO_ run in file stealth mode. -- 4. References --------------------- [1] phpCMS web site http://www.phpcms.de/ -- 5. History ---------------- - 2004/11/24 : vulnerability discovered - 2004/11/24 : vendor notified - 2004/11/25 : vendor response - 2004/11/25 : fix released -- 6. Contact information ---------------------------------- Cyrille Barthelemy <cb-publicbox@...ance.com> Web Site : http://www.cyrille-barthelemy.com _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Powered by blists - more mailing lists