[<prev] [next>] [day] [month] [year] [list]
Message-ID: <bb96d157-8d37-44c2-8c96-bfe2a9cf8759@beccati.com>
Date: Wed, 19 Nov 2025 15:26:12 +0100
From: Matteo Beccati <php@...cati.com>
To: "fulldisclosure@...lists.org" <fulldisclosure@...lists.org>
Subject: [FD] [REVIVE-SA-2025-004] Revive Adserver Vulnerabilities
========================================================================
Revive Adserver Security Advisory REVIVE-SA-2025-004
------------------------------------------------------------------------
https://www.revive-adserver.com/security/revive-sa-2025-004
------------------------------------------------------------------------
Date: 2025-11-19
Risk Level: Medium
Applications affected: Revive Adserver
Versions affected: <= 6.0.2
Versions not affected: >= 6.0.3
Website: https://www.revive-adserver.com/
========================================================================
========================================================================
Vulnerability 1: Stored XSS
========================================================================
Vulnerability Type: Improper Neutralization of Input During Web Page
Generation (‘Cross-site Scripting’) [CWE-79]
CVE-ID: CVE-2025-55126
Risk Level: Medium
CVSS Base Score: 6.5
CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
========================================================================
Description
-----------
HackerOne community member Dang Hung Vi (vidang04) has reported a stored
XSS vulnerability involving the navigation box at the top of
advertiser-related pages, with campaign names being the vector for the
stored XSS.
Details
-------
Advertiser/campaign names dynamically loaded via the
“inventory-retrieve.php” script were not properly escaped before being
displayed on the screen.
A manager user could craft campaign names to cause the script to execute
malicious JS code when using the navigation box at the top of the page
to switch between advertisers and campaigns. Successful exploitation
requires an attacker to trick a logged-in administrator into visiting
specific pages, and also performing some actions, such as switching
advertiser and campaigns using the navigation box. Most importantly, the
session cookie cannot be accessed or stolen via JavaScript, so the
disruption would be limited.
References
----------
https://hackerone.com/reports/3411750
https://github.com/revive-adserver/revive-adserver/commit/8053286
https://cwe.mitre.org/data/definitions/79.html
========================================================================
Vulnerability 2: Improper Neutralization of Whitespace
========================================================================
Vulnerability Type: Improper Neutralization of Whitespace [CWE-156]
CVE-ID: CVE-2025-52672
Risk Level: Medium
CVSS Base Score: 5.4
CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
========================================================================
Description
-----------
HackerOne community member Dao Hoang Anh (yoyomiski) has reported an
improper neutralization of whitespace in the username when adding new
users. A username with leading or trailing whitespace could be virtually
indistinguishable from its legitimate counterpart when the username is
displayed in the UI, potentially leading to confusion.
Details
-------
Username validation was not preventing whitespace characters from being
used. An attacker with user creation permissions could specifically
craft a username with leading or trailing whitespace and trick an admin
user to grant specific permissions to it rather than the legitimate user.
References
----------
https://hackerone.com/reports/3413764
https://github.com/revive-adserver/revive-adserver/commit/9b963ac
https://cwe.mitre.org/data/definitions/156.html
========================================================================
Vulnerability 3: Uncontrolled Resource Consumption
========================================================================
Vulnerability Type: Allocation of Resources Without Limits or
Throttling [CWE-770]
CVE-ID: CVE-2025-55128
Risk Level: Medium
CVSS Base Score: 6.5
CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
========================================================================
Description
-----------
HackerOne community member Dang Hung Vi (vidang04) has reported an
uncontrolled resource consumption vulnerability in the
“userlog-index.php”. An attacker with access to the admin interface
could request an arbitrarily large number of items per page, potentially
leading to a denial of service.
Details
-------
The “userlog-index.php” script and some other scripts using the pager
component were not restricting the “setPerPage” parameter, allowing
large number to be injected as “LIMIT” in SQL queries. The user log
table could grow very large on some installations, making the vector
effective for denial of service attacks performed by authenticated users.
References
----------
https://hackerone.com/reports/3413890
https://github.com/revive-adserver/revive-adserver/commit/d5141f7
https://cwe.mitre.org/data/definitions/770.html
========================================================================
Solution
========================================================================
We recommend updating to the most recent 6.0.3 version of Revive
Adserver, or whatever happens to be the current release at the time of
reading this security advisory.
========================================================================
Contact Information
========================================================================
The security contact for Revive Adserver can be reached at:
<security AT revive-adserver DOT com>.
Please review https://www.revive-adserver.com/security/ before doing so.
We only accept security reports through HackerOne.
--
Matteo Beccati
On behalf of the Revive Adserver Team
https://www.revive-adserver.com/
Download attachment "OpenPGP_0x819BAF32F410D901.asc" of type "application/pgp-keys" (649 bytes)
Download attachment "OpenPGP_signature.asc" of type "application/pgp-signature" (237 bytes)
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/
Powered by blists - more mailing lists