Exponent Slideshow XSS Vulnerability

2011.11.03
Credit: Andrei Rimsa
Risk: Low
Local: No
Remote: No
CWE: CWE-79


CVSS Base Score: 4.3/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

Title: Exponent Slideshow XSS Vulnerability Vendor: Exponent Product: Exponent CMS Tested Version: 0.97.0 Threat Class: XSS Severity: High Remote: yes Local: no Discovered By: Andrei Rimsa Alvares ===== Description ===== The file "modules/slideshowmodule/slideshow.js.php" is prone to XSS vulnerabilities. Multiple instance of variable $_GET['u'] gets outputted to the page without proper sanitization. ===== Impact ===== Malicious java script code can be executed in the context of the affected web site. ===== Proof of Concept ===== http://target/modules/slideshowmodule/slideshow.js.php?u=%3Cscript%3Ewin dow.alert(String.fromCharCode(88,83,83));%3C/script%3E ===== Workaround ===== No workaround is available at the time. ===== Disclosure Timeline ===== June, 16 2010 - Vendor notification. July, 07 2010 - No vendor reply. Public disclosure. ===== References ===== http://www.exponentcms.org _________________________________________________________________ Hotmail: Powerful Free email with security by Microsoft. https://signup.live.com/signup.aspx?id=60969


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top