1
adium
XOOPS Multiple Cross-Site Scripting Vulnerabilities - Security Advisory
  • 2009/7/31 17:45

  • adium

  • Just popping in

  • Posts: 99

  • Since: 2005/1/18


From: Lists <lists_at_senseofsecurity.com.au>
Date: Fri, 31 Jul 2009 16:05:46 +1000


XOOPS Multiple Cross-Site Scripting Vulnerabilities - Security Advisory - SOS-09-005 Release Date. 31-Jul-2009
Vendor Notification Date. 15-Jun-2009
Product. XOOPS
Platform. Independent
Affected versions. 2.3.3 (verified), possibly others Severity Rating. Medium
Impact. Cookie/credential theft, impersonation, loss of confidentiality Attack Vector. Remote
Solution Status. Vendor patch
CVE reference. Not yet assigned

Details.

XOOPS is a content management system written in PHP. During an application penetration test Sense of Security identified that Input passed to the "op" parameter of viewpmsg.php, and in the query string of user.php are vulnerable to Cross-Site Scripting vulnerabilities. This occurred as a result of the application not properly filtering HTML tags which allowed malicious JavaScript to be embedded. When input is incorrectly validated and not properly sanitised and then displayed in a web page, attackers can trick users into viewing the web page and causing malicious code to be executed.

Proof of Concept.

http://IP/xoops-2.3.3/htdocs/modules/pm/viewpmsg.php?op='"><script>alert('vulnerable')</script><link id='

http://IP/xoops-2.3.3/htdocs/modules/ ... t;><script>alert('vulnerable')</script>

Solution.

Vendor patch

Discovered by.

Sense of Security

About us.

Sense of Security is a leading provider of IT security and risk management solutions. Our team has expert skills in assessment and assurance, strategy and architecture, and deployment through to ongoing management. We are Australia's premier application security consultancy and trusted IT security advisor to many of the countries largest organisations.

Sense of Security Pty Ltd

Level 3, 66 King St
Sydney NSW 2000
AUSTRALIA

T: +61 (0)2 9290 4444
F: +61 (0)2 9290 4455
W: http://www.senseofsecurity.com.au
E: info_at_senseofsecurity.com.au




The latest version of this advisory can be found at:

http://www.senseofsecurity.com.au/advisories/SOS-09-005.pdf

Other Sense of Security advisories can be found at:

http://www.senseofsecurity.com.au/res ... t-security-advisories.php Received on Jul 31 2009

2
trabis
Re: XOOPS Multiple Cross-Site Scripting Vulnerabilities - Security Advisory
  • 2009/7/31 17:59

  • trabis

  • Core Developer

  • Posts: 2269

  • Since: 2006/9/1 1


This was fixed on SVN some time ago. Thanks.

3
sailjapan
Re: XOOPS Multiple Cross-Site Scripting Vulnerabilities - Security Advisory

was a patch released?
Never let a man who does not believe something can be done, talk to a man that is doing it.

4
ghia
Re: XOOPS Multiple Cross-Site Scripting Vulnerabilities - Security Advisory
  • 2009/8/12 21:38

  • ghia

  • Community Support Member

  • Posts: 4953

  • Since: 2008/7/3 1


Users which have Protector running are safe, because Protector tackles this one:
Test it on XOOPS.org
Remedy is to overwrite your /modules/pm/ and modules/profile/ in XOOPS 2.3.3 with the ones from 2.4.0 .
Don't use any other files of 2.4.0!!!!

5
trabis
Re: XOOPS Multiple Cross-Site Scripting Vulnerabilities - Security Advisory
  • 2009/8/13 17:10

  • trabis

  • Core Developer

  • Posts: 2269

  • Since: 2006/9/1 1


Quote:

query string of user.php are vulnerable to Cross-Site Scripting vulnerabilities.


Anyone can reproduce this?


6
ghia
Re: XOOPS Multiple Cross-Site Scripting Vulnerabilities - Security Advisory
  • 2009/8/13 18:21

  • ghia

  • Community Support Member

  • Posts: 4953

  • Since: 2008/7/3 1


Forwarded you a mail about register and user.php

Login

Who's Online

77 user(s) are online (41 user(s) are browsing Support Forums)


Members: 0


Guests: 77


more...

Donat-O-Meter

Stats
Goal: $100.00
Due Date: Jul 31
Gross Amount: $0.00
Net Balance: $0.00
Left to go: $100.00
Make donations with PayPal!

Latest GitHub Commits