lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <004a01c4b148$06815f40$6501a8c0@angryapple.com>
From: steven at lovebug.org (steven)
Subject: Multiple Cross Site Scripting Vulnerabilities in FuseTalk

Date:     October 12, 2004
Vendor:   FuseTalk
Issue:    Multiple Cross Site Scripting Vulnerabilities
URL:      http://www.fusetalk.com
Advisory: http://www.lovebug.org/fusetalk_advisory.txt

Notes:

The vendor was contacted last month and responded that:
"all of these issues below were fixed in "Security Patches" released
04/21/2004 & 05/04/2004.  All customers were notified of these and were to
apply them.  The site you are visiting obviously has not applied these
patches and should.  If you do not the person in charge of that site you
visit you might want them to email me sales [AT] fusetalk.com and I can let
them know where to go and get those patches.

However, it appears a large number of sites running FuseTalk are vulnerable
and even the Demo Enterprise Edition on their homepage is currently
vulnerable.  It would appear these patches are not making their way around
very well and/or do not fix all the below listed problems.

Issue:

I am not 100% sure of the version of sites I have found to be vulnerable use
or if their vulnerabilities exist in all similar versions of FuseTalk.  It
might be possible that some level of customization has occurred and spawned
the vulnerability.  In any case, I will explain the circumstances in which
the problem can be recreated as I found it.  Finally, the FuseTalk website
itself contains a CSS vulnerability in the latest FuseTalk Enterprise
Edition demo edition. It would appear Fuse Talk Enterprise Edition 2.0 and
other versions are all affected.

1) The data that is sent to searchresults.cfm does not appear to be
filtered.  Sending it a search string such as
<script>alert(document.cookie)</script> will yield a popup with the cookie
data.

2) In some forums (often older version) when viewing the profile of users,
if scripting code is passed into tombstone.cfm?ProfileID i.e.
(tombstone.cfm?ProfileID=<script>alert(document.cookie)</script>) the text
is once again unfiltered and the script with be executed

3) One of the major sites I use automatically returns and error page that
will not filter and pretty much executes any script sent to any FuseTalk
url.  I am not sure if this is their own setup or a FuseTalk option.  I am
under the assumption it is their own 404 issue.  However, if there is a
setting that brings all invalid pages to a screen that says: "Page Not Found
The web page you requested could not be found. Please check to make sure you
entered the correct information." then this makes any url that FuseTalk
processes vulnerable as well.

4) Lastly:

Now in the Enterprise Edition as the demon demo on the website, I have only
found one CSS vulnerability thus far.  That error lies within
usersearchresults.cfm?keyword="SCRIPT".  We can recreate the same CSS
problems above with the url:
http://www.fusetalk.com/forum/usersearchresults.cfm?keyword=<script>alert(document.cookie)</script>&FT_ACTION=SearchUsers

Solution:

It seems Spiffomatic64 has reported a different CSS problem with FuseTalk
earlier today and his suggestions should apply just the same.

Credits:

Thanks to Virginia Tech for the edumucation I am receiving and to my
girlfirend for being so sweet. [SDC]

-Steven
steven@...ebug.org
www.lovebug.org/


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ