lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20060225145724.lbt8nd0tuv40cgos@webmail.nukedx.com> Date: Sat Feb 25 15:17:10 2006 From: nukedx at nukedx.com (nukedx@...edx.com) Subject: Advisory: eZ publish <= 3.7.3 (imagecatalogue module) XSS vulnerability --Security Report-- Advisory: eZ publish <= 3.7.3 (imagecatalogue module) XSS vulnerability --- Author: Mustafa Can Bjorn "nukedx a.k.a nuker" IPEKCI --- Date: 25/02/06 01:43 PM --- Contacts:{ ICQ: 10072 MSN/Email: nukedx (at) nukedx (dot) com Web: http://www.nukedx.com } --- Vendor: eZ systems (http://www.ez.no) Version: 3.7.3 and must be prior versions. About: Via this method remote attacker can make malicious links for clicking and when victim clicks this links victim's browser would be inject with XSS. Level: Harmless --- How&Example: ?ReferrerURL variable did not sanitized properly. GET -> http://[site]/[ezdir]/imagecatalogue/imageview/475/?RefererURL=">[XSS] EXAMPLE -> http://[site]/[ezdir]/imagecatalogue/imageview/475/?RefererURL="><script>alert('X');</script><link%20href=" -- Timeline: * 25/02/2006: Vulnerability found. * 25/02/2006: Contacted with vendor and waiting reply. -- Original advisory: http://www.nukedx.com/?viewdoc=16