TUCoPS :: Web :: General :: web5710.htm

Many scripting language IMG tag XSS vulnerability
26th Sep 2002 [SBWID-5710]

	Many scripting language IMG tag XSS vulnerability


	 Xoops RC3.0.4

	 PHP-Nuke 6.0

	 NPDS 4.8 SuperCache

	 daCode 1.2.0

	 Drupal 4.0.0

	 phpWebSite 0.8.3


	In David Suzanne (aka dAs) [das@echu.org] advisory :



	After  having  sent  ECHU  alert  on   "Xoops   RC3   script   injection
	(http://www.echu.org/modules/news/article.php?storyid=95),   I   realize
	that it's not  a  XOOPS  problem  (Kazumi  Ono,  XOOPS  Developper,  and
	Jan304, XOOPS Dutch Support, confirmed this) but a html problem that  is
	hard to fix and can be misuse in almost every cms.

	The problem appears when a user post a news, a vulnerability  exists  in
	these CMS that allow a typical IMG attack against visitors :

	<IMG SRC="javascript:alert('unsecure')"> 


	In order to test this vulnerability, you can go  on  websites  that  use
	these CMS, post a news with this code and see the result.

	A badly disposed member can propose a  news  containing  code  (for  une
	news containing code sample of a new vulnerability for example)  and  if
	webmasters or moderators don't take care, they will approve the news.


	There's no secure release of these CMS, so the unique  solution  is,  at
	this moment, to disable Html, in each news post, to avoid  the  problem.
	The "removehack" from NPDS doesn't fix the problem  even  if  NPDS  team
	tell it does.




	XOOPS: http://www.xoops.org

	PHP-NUKE: http://www.php-nuke.org

	NPDS: http://www.npds.org

	daCode: http://www.dacode.org

	Drupal: http://www.drupal.org

	phpWebSite: http://phpwebsite.appstate.edu

	Blocus Advisory on NPDS: http://www.blocus-zone.com/modules/news/article.php?storyid=132



TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2023 AOH