[<prev] [next>] [day] [month] [year] [list]
Message-Id: <201312082330.rB8NUvOQ026524@sf01web2.securityfocus.com>
Date: Sun, 8 Dec 2013 23:30:57 GMT
From: zoczus@...il.com
To: bugtraq@...urityfocus.com
Subject: LiveZilla 5.1.0.0 Reflected XSS in translations
Author: Jakub Zoczek [zoczus@...il.com]
CVE Reference: CVE-2013-7002
Product: LiveZilla
Vendor: LiveZilla GmbH [http://livezilla.net]
Affected version: 5.1.0.0
Severity: Medium
CVSSv2 Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
Status: Fixed
0x01 Background
LiveZilla, the widely-used and trusted Live Help and Live Support System.
0x02 Description
LiveZilla in version 5.1.0.0 is prone to Reflected Cross-Site Scripting issue in translation PHP script used to generate JSON with connections between origin and destination languages. Content type is text/html and g_language GET variable is displayed without sanitization, which make the script vulnerable.
0x03 Proof of Concept
http://hostname/livezilla/mobile/php/translation/index.php?g_language=f"><img src=a onerror=alert('XSS')>h
0x04 Fix
Vulnerability was fixed in LiveZilla 5.1.1.0 version.
0x05 Timeline
20.11.2013 - Vendor notified
21.11.2013 - Fix released, vendor responded
09.12.2013 - Public Disclosure
Powered by blists - more mailing lists