lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20080531023539.23353.qmail@securityfocus.com> Date: 31 May 2008 02:35:39 -0000 From: bugtraq@...ncosmo.com To: bugtraq@...urityfocus.com Subject: VisualSentinel 0.7 Cross Agent Scripting Vulnerability VisualSentinel 0.7 Cross Agent Scripting # Discovered by: Alfredo Panzera, Opencosmo Security # Software vendor: http://www.opencosmo.com # Date: 31-05-2008 # Vulnerability: The vulnerability consists on inject javascript code falsify the user agent's attacker during an attack and then save in the log the user agent falsified. # Vulnerable string: $user_useragent = $_SERVER ['HTTP_USER_AGENT']; # Solution: The development team has promptly issued a patch the vulnerability. You can download the latest version from the download page. http://www.opencosmo.com/product-1.html ############################################################################## Opencosmo Security http://www.opencosmo.com