TUCoPS :: Web :: CMS / Portals :: b06-2888.htm

Cabacos Web CMS<= 3.8 - XSS
Cabacos Web CMS<= 3.8 - XSS
Cabacos Web CMS<= 3.8 - XSS



[MajorSecurity #13]Cabacos Web CMS<= 3.8 - XSS=0D
----------------------------------------------=0D
=0D
Software: Cabacos Web CMS=0D
=0D
Version: <=3.8.498=0D
=0D
Type: Cross site scripting=0D
=0D
Date: June, 10th 2006=0D
=0D
Vendor: IT-Direkt=0D
=0D
Page: http://www.cabacos-web-cms.de=0D 
=0D
=0D
Credits:=0D
----------------------------=0D
=0D
Discovered by: David "Aesthetico" Vieira-Kurz=0D
http://www.majorsecurity.de=0D 
=0D
Original Advisory:=0D
----------------------------=0D
http://www.majorsecurity.de/advisory/major_rls13.txt=0D 
=0D
Affected Products:=0D
----------------------------=0D
=0D
Cabacos Web CMS 3.8.498 and prior=0D
=0D
Description:=0D
----------------------------=0D
=0D
Cabacos Web CMS is a well known and commercial Content Management System.=0D
=0D
Requirements:=0D
----------------------------=0D
=0D
register_globals = On=0D
=0D
Vulnerability:=0D
----------------------------=0D
=0D
Input passed to the searchform input fields is not properly sanitised before being returned to the user.=0D
This can be exploited to execute arbitrary HTML and script code in context of an affected site.=0D
=0D
=0D
Solution:=0D
----------------------------=0D
Edit the source code to ensure that input is properly sanitised.=0D
You should work with "htmlspecialchars()" or "strip_tags()" php-function to ensure that html tags=0D
are not going to be executed.=0D
=0D
Example:=0D
=0D
=0D
Set "register_globals" to "Off".=0D
=0D
Exploitation:=0D
---------------------------=0D
Goto the searchform input fields and type in following line as searchword:=0D
=0D
=0D
=0D

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH