by r0t,der4444,cembo,VietMafia

Saturday, December 17, 2005

FarCry XSS vuln.

FarCry XSS vuln.

Vuln. discovered by : r0t
Date: 17 dec. 2005
vendor:http://farcry.daemon.com.au/
affected version:3.0 and prior


Product Description:

FarCry is an open source Content Management System (CMS), originally developed by Daemon. It's fully functional, and runs in a host of Enterprise environments today. It requires the Macromedia ColdFusion MX platform and a viable enterprise database (currently FarCry supports MSSQL, Oracle, PostgreSQL and MySQL). The solution runs on Windows 2k+ a vareity of *nix platforms (including Solaris and OSX).


Vuln. Description:

FarCry contains a flaw that allows a remote cross site scripting attack. This flaw exists because input passed to search paremters in search module isn't properly sanitised before being returned to the user.
This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.


Solution:
Edit the source code to ensure that input is properly sanitised.

1 Comments:

Anonymous Geoff Bowers told...

hi there, I'm a developer on the FarCry CMS project. I stumbled across your advisory quite by accident. I thought it might be worthwhile fixing.

Can I confirm that what you are saying is on the sample search form, someone can deface their own search results with a cross-site scripting attack? Is this the extent of the issue, or is it something more serious than this?

12:10 AM

 

Post a Comment

<< Home

 
Copyright (c) 2006 Pridels Sec Crew