lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CAOK5wbCGo3eZZ-MJQcXt95pQp8OUh69VEXZgq64pSUkEVAoR1w@mail.gmail.com> Date: Mon, 16 Apr 2018 20:40:29 +0200 From: Manuel Garcia Cardenas <advidsec@...il.com> To: fulldisclosure@...lists.org, dm@...urityfocus.com, submit@...sec.com Subject: [FD] Kodi <= 17.6 - Persistent Cross-Site Scripting ============================================= MGC ALERT 2018-003 - Original release date: March 19, 2018 - Last revised: April 16, 2018 - Discovered by: Manuel Garcia Cardenas - Severity: 4,8/10 (CVSS Base Score) - CVE-ID: CVE-2018-8831 ============================================= I. VULNERABILITY ------------------------- Kodi <= 17.6 - Persistent Cross-Site Scripting II. BACKGROUND ------------------------- Kodi (formerly XBMC) is a free and open-source media player software application developed by the XBMC Foundation, a non-profit technology consortium. Kodi is available for multiple operating systems and hardware platforms, with a software 10-foot user interface for use with televisions and remote controls. III. DESCRIPTION ------------------------- Has been detected a Persistent XSS vulnerability in the web interface of Kodi, that allows the execution of arbitrary HTML/script code to be executed in the context of the victim user's browser. IV. PROOF OF CONCEPT ------------------------- Go to: Playlist -> Create Create a playlist injecting javascript code: <img src=x onerror=alert(1)> The XSS is executed, in the victim browser. V. BUSINESS IMPACT ------------------------- An attacker can execute arbitrary HTML or script code in a targeted user's browser, this can leverage to steal sensitive information as user credentials, personal data, etc. VI. SYSTEMS AFFECTED ------------------------- Kodi <= 17.6 VII. SOLUTION ------------------------- Vendor include the fix: https://trac.kodi.tv/ticket/17814 VIII. REFERENCES ------------------------- https://kodi.tv/ IX. CREDITS ------------------------- This vulnerability has been discovered and reported by Manuel Garcia Cardenas (advidsec (at) gmail (dot) com). X. REVISION HISTORY ------------------------- March 19, 2018 1: Initial release April 16, 2018 2: Last revision XI. DISCLOSURE TIMELINE ------------------------- March 19, 2018 1: Vulnerability acquired by Manuel Garcia Cardenas March 19, 2018 2: Send to vendor March 30, 2018 3: Vendo fix April 16, 2018 4: Sent to lists XII. LEGAL NOTICES ------------------------- The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. XIII. ABOUT ------------------------- Manuel Garcia Cardenas Pentester _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists