lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CAMWaY3MmknseapWxUaYjs2edx_3Awdyf1o8Tqyy_yHSGD3EY6w@mail.gmail.com> Date: Sat, 12 Dec 2015 20:22:48 +0530 From: CSW Research Lab <disclose@...ersecurityworks.com> To: fulldisclosure@...lists.org Subject: [FD] OcPortal CMS 9.0.20 – Cross-Site Scripting Vulnerability ================================================================ OcPortal CMS 9.0.20 – Cross-Site Scripting Vulnerability ================================================================ Information ********************** Vulnerability Type : Cross Site Scripting Vulnerability Vulnerable Version : 9.0.20 Severity: Medium Author – Arjun Basnet CVE-ID: N/A Homepage: https://ocportal.com/site/sites.htm/ Description *********************** OcPortal CMS is prone to Cross-site scripting vulnerability because it fails to sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user of the affected site. Proof of Concept URL *************************** [+] http://localhost/ocportal/data/emoticons.php?field_name=post&keep_session=1 840048647&utheme=default&overlay=1/ Severity Level: ========================================================= Medium Description: ========================================================== Vulnerable Product: [+] OcPortal CMS 9.0.20 Vulnerable Parameter(s): [+] Field_Name Advisory Timeline ************************ 08-Nov-2015- Reported 08-Nov-2015- Vendor Response 08-Nov-2015- Vendor Fixed 12-Dec-2015- Public disclosed Fixed Version: ***************** [+] OcPortal CMS 9.0.21 (https://ocportal.com/site/sites.htm) Reference ***************** [+] http://ocportal.com/site/news/view/new-releases/ocportal-9-0-21-released.htm?filter=1%2C2%2C3%2C29%2C30 [+] https://www.owasp.org/index.php/Cross-site_Scripting_(XSS) [+] http://ocportal.com/site/news/view/security_issues/security-patch-for-xss.htm?filter=1%2C2%2C3%2C29%2C30 Credits & Authors -------------------- Arjun Basnet from Cyber Security Works Pvt. Ltd. ( http://cybersecurityworks.com) -- ---------- Cheers !!! Team CSW Research Lab <http://www.cybersecurityworks.com> _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/