Sense of Security – Security Advisory – SOS-09-005
Release Date. | 31-Jul-2009 |
Last Update. | 31-Jul-2009 |
Vendor Notification Date. | 15-Jun-2009 |
Product. | XOOPS |
Platform. | Independent |
Affected versions. | 2.3.3 (verified), possibly others. |
Severity Rating. | Medium |
Impact. | Cookie/credential theft |
Impersonation | |
Loss of confidentiality | |
Attack Vector. | Remote |
Solution Status. | Vendor patch |
CVE reference. | CVE-Not yet assigned |
Details.
XOOPS is a content management system written in PHP. During an application penetration test Sense of Security identified that input passed to the ‘op’ parameter of viewpmsg.php, and in the query string of user.php are vulnerable to Cross-Site Scripting vulnerabilities. This occurred as a result of the application not properly filtering HTML tags which allowed malicious JavaScript to be embedded. When input is incorrectly validated and not properly sanitised and then displayed in a web page, attackers can trick users into viewing the web page and causing malicious code to be executed.
Proof of concept.
http://lP/xoops-2.3.3/htdocs/modules/pm/viewpmsg.php?op=’
“><script>alert(‘vulnerable’)
</script><link id=’http://lP/xoops-2.3.3/htdocs
/modules/profile/user.php?”><script>alert(‘
vulnerable’)</script>
Solution.
Vendor patch
Discovered by.
SOS Labs.