lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CAFWG0-hOWfyov3fSMnS_9n87UA2gLWTnY0okVsVVaH0h07yF1w@mail.gmail.com> Date: Wed, 18 Feb 2015 16:12:57 +0800 From: Jing Wang <justqdjing@...il.com> To: fulldisclosure@...lists.org Subject: [FD] CVE-2014-9468 InstantASP InstantForum.NET Multiple XSS (Cross-Site Scripting) Security Vulnerabilities *CVE-2014-9468 InstantASP InstantForum.NET Multiple XSS (Cross-Site Scripting) Security Vulnerabilities* Exploit Title: InstantASP InstantForum.NET Multiple XSS (Cross-Site Scripting) Security Vulnerabilities Product: InstantForum.NET Vendor: InstantASP Vulnerable Versions: v4.1.3 v4.1.1 v4.1.2 v4.0.0 v4.1.0 v3.4.0 Tested Version: v4.1.3 v4.1.1 v4.1.2 Advisory Publication: Feb 18, 2015 Latest Update: Feb 18, 2015 Vulnerability Type: Cross-Site Scripting [CWE-79] CVE Reference: CVE-2014-9468 CVSS Severity (version 2.0): CVSS v2 Base Score: 4.3 (MEDIUM) (AV:N/AC:M/Au:N/C:N/I:P/A:N) (legend) Impact Subscore: 2.9 Exploitability Subscore: 8.6 Credit: Wang Jing [Mathematics, Nanyang Technological University, Singapore] *Advisory Details:* *(1) Vendor & Product Description:* *Vendor:* InstantASP *Product & Version:* InstantForum.NET v4.1.3 v4.1.1 v4.1.2 v4.0.0 v4.1.0 v3.4.0 *Vendor URL & Download:* InstantForum.NET can be downloaded from here, http://docs.instantasp.co.uk/InstantForum/default.html?page=v413tov414guide.html *Product Introduction:* “InstantForum.NET is a feature rich, ultra high performance ASP.NET & SQL Server discussion forum solution designed to meet the needs of the most demanding online communities or internal collaboration environments. Now in the forth generation, InstantForum.NET has been completely rewritten from the ground-up over several months to introduce some truly unique features & performance enhancements." "The new administrator control panel now offers the most comprehensive control panel available for any ASP.NET based forum today. Advanced security features such as role based permissions and our unique Permission Sets feature provides unparalleled configurable control over the content and features that are available to your users within the forum. Moderators can easily be assigned to specific forums with dedicated moderator privileges for each forum. Bulk moderation options ensure even the busiest forums can be managed effectively by your moderators." "The forums template driven skinning architecture offers complete customization support. Each skin can be customized to support a completely unique layout or visual appearance. A single central style sheet controls every aspect of a skins appearance. The use of unique HTML wrappers and ASP.NET 1.1 master pages ensures page designers can easily integrate an existing design around the forum. Skins, wrappers & master page templates can be applied globally to all forums or to any specific forum." *(2) Vulnerability Details:* InstantForum.NET has a security problem. It can be exploited by XSS attacks. *(2.1)* The first vulnerability occurs at “Join.aspx” page with "SessionID" parameter of it. *(2.2)* The second vulnerability occurs at “Logon.aspx” page with "SessionID" parameter of it. *References:* http://tetraph.com/security/cves/cve-2014-9468-instantasp-instantforum-net-multiple-xss-cross-site-scripting-security-vulnerabilities/ http://securityrelated.blogspot.com/2015/02/cve-2014-9468-instantasp.html https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9468 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9468 https://security-tracker.debian.org/tracker/CVE-2014-9468 http://www.cvedetails.com/cve/CVE-2014-9468/ http://www.security-database.com/detail.php?alert=CVE-2014-9468 http://packetstormsecurity.com/files/cve/CVE-2014-9468 http://www.pentest.it/cve-2014-9468.html http://www.naked-security.com/cve/CVE-2014-9468/ http://www.inzeed.com/kaleidoscope/cves/cve-2014-9468/ http://007software.net/cve-2014-9468/ http://diebiyi.com/articles/%E5%AE%89%E5%85%A8/cve-2014-9468/ https://vulnerabilitypost.wordpress.com/2015/02/18/cve-2014-9468/ https://security-tracker.debian.org/tracker/CVE-2014-9468 -- Wang Jing, Division of Mathematical Sciences (MAS), School of Physical and Mathematical Sciences (SPMS), Nanyang Technological University (NTU), Singapore. http://www.tetraph.com/wangjing/ https://twitter.com/justqdjing _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists