[<prev] [next>] [day] [month] [year] [list]
Message-Id: <200704120144.06303.mail@hboeck.de>
Date: Thu, 12 Apr 2007 01:44:06 +0200
From: "Hanno Böck" <mail@...eck.de>
To: vulnwatch@...nwatch.org, full-disclosure@...ts.grok.org.uk,
bugtraq@...urityfocus.com
Subject: Cross site scripting in mephisto 0.7.3
Cross site scripting in mephisto 0.7.3
security advisory
References:
http://www.mephistoblog.com
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1873
Description:
Cross site scripting describes attacks that allow to insert malicious
html or javascript code via get or post forms. This can be used to steal
session cookies.
mephisto is a rails-based blog application. The search function can be
used to inject javascript code.
Workaround/Fix:
There's no vendor fix.
Vendor has been contacted 2007-03-10 and replied that they were working on
the issue.
Sample injection URL:
http://demo.mephistoblog.com/search?q=%3Cscript%3Ealert%281%29%3C%2Fscript%3E
CVE Information:
The Common Vulnerabilities and Exposures (CVE) project has assigned the
name CVE-2007-1873 to this issue. This is a candidate for inclusion in
the CVE list (http://cve.mitre.org/), which standardizes names for
security problems.
Credits and copyright:
This vulnerability was discovered by Hanno Boeck of schokokeks.org
webhosting.
It's licensed creative commons attribution:
http://creativecommons.org/licenses/by/3.0/
Hanno Boeck, 2007-04-12, http://www.hboeck.de
Content of type "application/pgp-signature" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists