[<prev] [next>] [day] [month] [year] [list]
Message-ID: <200411261053.06333.cb-lse@ifrance.com>
From: cb-lse at ifrance.com (Cyrille Barthelemy)
Subject: phpCMS <= 1.2.1 Xss Vulnerability, Information disclosure
Title: phpCMS <= 1.2.1 Xss Vulnerability, Information disclosure
Affects:
- <= 1.2.1
Effect: Cross Site Attack (session hijacking, ...)
Id: cbsa-0006
Release Date: 2004/11/26
Author: Cyrille Barthelemy <cb-publicbox@...ance.com>
-- 1. Introduction
------------------------
phpCMS is a content management system, easily configurable with no particular
dependency and very flexible. Please go to [1] to read a complete description
of the project. The last version, 1.2.1, has been released on 2004, november
22.
-- 2. Problem
------------------
An implementation error in the validation of the user input lead to an Xss
vulnerability allowing a user to create cross site attacks, and also disclose
information about the server configuration when phpCMS is configured in
non-stealth mode with debug mode activated.
Example of exploitation :
http://[somehost]/parser/parser.php?file=<script>alert(document.cookie)</script>
The error page display the input supplied by the user, without filtering, and
the full path to the phpCMS root directory.
Example of exploitation :
http://[somehost]/parser/parser.php?file=donotexist
=>
phpCMS 1.2.1
Error: 07: could not find file for parsing.
/var/www/localhost/htdocsdonotexists/index.htm
^^^^^^^^^^^^^^^^^^^^^^^^^
-- 3. Solution
------------------
Upgrade to the next version 1.2.1.pl1, available at :
http://www.phpcms.de/download/index.en.html
_DO NOT_ run your configuration in debug mode with untrusted access.
_DO_ run in file stealth mode.
-- 4. References
---------------------
[1] phpCMS web site
http://www.phpcms.de/
-- 5. History
----------------
- 2004/11/24 : vulnerability discovered
- 2004/11/24 : vendor notified
- 2004/11/25 : vendor response
- 2004/11/25 : fix released
-- 6. Contact information
----------------------------------
Cyrille Barthelemy <cb-publicbox@...ance.com>
Web Site : http://www.cyrille-barthelemy.com
Powered by blists - more mailing lists