[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20060129204240.31008.qmail@securityfocus.com>
Date: 29 Jan 2006 20:42:40 -0000
From: preben@...chcom.no
To: bugtraq@...urityfocus.com
Subject: EasyCMS vulnerable to XSS injection.
The Norwegian web-publishing system EasyCMS (www.easycms.no) contains multiple input flaws letting users conduct successful XSS attacks. Both in the admin section, and the webpage that uses the system is vulnerable to XSS.
It does not filter script tags and simple scripting like <script>alert(‘XSS’)</script> will work. Nearly all of the systems input boxes is open for scripting tags.
Furthermore it’s open for directory browsing ( http://<site>/images ).
The developers has been notified, and working on patching the system.
Please credit to: Preben Nyløkken
Powered by blists - more mailing lists