by r0t,der4444,cembo,VietMafia

Friday, December 23, 2005

CommonSpot Content Server vuln.

CommonSpot Content Server vuln.

Vuln. discovered by : r0t
Date: 23 dec. 2005
vendor:http://www.paperthin.com/
affected version:4.5 and prior


Product Description:

PaperThin's award-winning technology enables our customers to meet their business objectives. With CommonSpot Content Server, organizations can quickly build and easily maintain dynamic, personalized and sophisticated sites.
CommonSpot scales to meet the Web publishing and content management needs of the most demanding sites, and is used by more than 200 organizations of all sizes worldwide.


Vuln. Description:

CommonSpot Content Server contains a flaw that allows a remote cross site scripting attack. This flaw exists because input passed to "NewWindow" paremter isn't properly sanitised before being returned to the user.
This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

poc:

XSS:
/loader.cfm?url=/[DIRPATH]/[DIRPATH]/email
-login-info.cfm&errmsg=No%20user%20account
%20was%20found%20for%20that%20email%20addr
ess.%20%20Please%20try%20again.&bNewWindo
w=[XSS]

full path:
/loader.cfm?url=/[DIRPATH]/[DIRPATH]/email
-login-info.cfm&errmsg=[CODE]


Solution:
Edit the source code to ensure that input is properly sanitised.

0 Comments:

Post a Comment

<< Home

 
Copyright (c) 2006 Pridels Sec Crew