lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <201208230643.q7N6hCnf013397@sf01web2.securityfocus.com>
Date: Thu, 23 Aug 2012 06:43:12 GMT
From: sschurtz@...ksecurity.de
To: bugtraq@...urityfocus.com
Subject: SaltOS 3.1 Cross-Site Scripting vulnerability

Advisory: SaltOS 3.1 Cross-Site Scripting vulnerability
Advisory ID: SSCHADV2012-018
Author: Stefan Schurtz
Affected Software: Successfully tested on SaltOS 3.1 r4908 
Vendor URL: http://www.saltos.net
Vendor Status: fixed

==========================
Vulnerability Description
==========================

SaltOS 3.1 is prone to a Cross-Site Scripting vulnerability, because of using PHPExcel 1.7.7 (latest version)

==================
PoC-Exploit
==================

http://[target]/SaltOS-3.1/user/lib/phpexcel/PHPExcel/Shared/JAMA/docs/download.php/ '><script>alert('xss')</script>

=========
Solution
=========

Unused directories (docs, examples and tests directories from the PHPExcel/Shared/JAMA directory) are removed.
 
Update to the latest version (Fixed in the nightly build r5696 from 2012-08-14).

====================
Disclosure Timeline
====================

13-Aug-2012 - developer informed
13-Aug-2012 - feedback from developer
14-Aug-2012 - fixed by developer

========
Credits
========

Vulnerability found and advisory written by Stefan Schurtz.

===========
References
===========

http://www.darksecurity.de/advisories/2012/SSCHADV2012-018.txt

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ