lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAFWG0-iKQp6vg6TxcYBu=kMRFyCfcbJDxdmkP8uq=Q7JUneknQ@mail.gmail.com>
Date: Sat, 31 Jan 2015 10:24:41 +0800
From: Jing Wang <justqdjing@...il.com>
To: fulldisclosure@...lists.org
Subject: [FD] CVE-2014-9559 SnipSnap XSS (Cross-Site Scripting) Security
	Vulnerabilities

CVE-2014-9559 SnipSnap XSS (Cross-Site Scripting) Security Vulnerabilities

Exploit Title: SnipSnap /snipsnap-search? query Parameter XSS
Product: SnipSnap
Vulnerable Versions: 0.5.2a  1.0b1  1.0b2
Tested Version: 0.5.2a  1.0b1  1.0b2
Advisory Publication: Jan 30, 2015
Latest Update: Jan 30, 2015
Vulnerability Type: Cross-Site Scripting [CWE-79]
CVE Reference: CVE-2014-9559
Credit: Wang Jing [MAS, Nanyang Technological University (NTU), Singapore]





Advisory Details:


(1) Vendor & Product Description

Vendor:
SnipSnap

Product & Version:
SnipSnap
0.5.2a
1.0b1
1.0b2


Vendor URL & Download:
http://snipsnap.org

Product Description:
"SnipSnap is a user friendly content management system with features such
as wiki and weblog. "







(2) Vulnerability Details:
SnipSnap has a security problem. It can be exploited by XSS attacks.

(2.1) The vulnerability occurs at "snipsnap-search?" page with "query"
parameter.






References:
http://tetraph.com/security/cves/cve-2014-9559-snipsnap-xss-cross-site-scripting-security-vulnerabilities/
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9559
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9559
https://security-tracker.debian.org/tracker/CVE-2014-9559
http://www.cvedetails.com/cve/CVE-2014-9559/
http://www.security-database.com/detail.php?alert=CVE-2014-9559
http://packetstormsecurity.com/files/cve/CVE-2014-9559
http://www.pentest.it/cve-2014-9559.html
http://www.naked-security.com/cve/CVE-2014-9559/
http://007software.net/cve-2014-9559/
https://security-tracker.debian.org/tracker/CVE-2014-9559






--
Wang Jing,
Division of Mathematical Sciences (MAS),
School of Physical and Mathematical Sciences (SPMS),
Nanyang Technological University (NTU),
Singapore.
http://www.tetraph.com/wangjing/

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ