Exponent Slideshow XSS Vulnerability

看板Bugtraq作者時間15年前 (2010/07/08 06:01), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串1/1
Title: Exponent Slideshow XSS Vulnerability Vendor: Exponent Product: Exponent CMS Tested Version: 0.97.0 Threat Class: XSS Severity: High Remote: yes Local: no Discovered By: Andrei Rimsa Alvares =3D=3D=3D=3D=3D Description =3D=3D=3D=3D=3D The file "modules/slideshowmodule/slideshow.js.php" is prone to XSS vulnera= bilities. Multiple instance of variable $_GET['u'] gets outputted to the pa= ge without proper sanitization. =3D=3D=3D=3D=3D Impact =3D=3D=3D=3D=3D Malicious java script code can be executed in the context of the affected w= eb site. =3D=3D=3D=3D=3D Proof of Concept =3D=3D=3D=3D=3D http://target/modules/slideshowmodule/slideshow.js.php?u=3D%3Cscript%3Ewind= ow.alert(String.fromCharCode(88=2C83=2C83))=3B%3C/script%3E =3D=3D=3D=3D=3D Workaround =3D=3D=3D=3D=3D No workaround is available at the time. =3D=3D=3D=3D=3D Disclosure Timeline =3D=3D=3D=3D=3D June=2C 16 2010 - Vendor notification. July=2C 07 2010 - No vendor reply. Public disclosure. =3D=3D=3D=3D=3D References =3D=3D=3D=3D=3D http://www.exponentcms.org =20 _________________________________________________________________ Hotmail: Powerful Free email with security by Microsoft. https://signup.live.com/signup.aspx?id=3D60969=
文章代碼(AID): #1CDFaUe8 (Bugtraq)