by r0t,der4444,cembo,VietMafia

Wednesday, December 21, 2005

SyntaxCMS XSS vuln.

SyntaxCMS XSS vuln.

Vuln. discovered by : r0t
Date: 21 dec. 2005
vendor:http://www.syntaxcms.org/
affected version:1.2.1 and prior

Product Description:

SyntaxCMS simplifies publishing various types of content to a site, facilitates creating and managing arbitrary relationships among content items, automates and accelerates custom development, and encourages reuse of site components with other SyntaxCMS installations. It is built using PHP and MySQL and is licensed under the Common Public License.


Vuln. Description:

SiteSage contains a flaw that allows a remote cross site scripting attack. This flaw exists because input passed to "search_query" paremter isn't properly sanitised before being returned to the user.
This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

example:

/search/?search_query=[XSS]

Solution:
Edit the source code to ensure that input is properly sanitised.

1 Comments:

Anonymous Sandy Smith told...

This is fixed in CVS. To patch your copy, diff from syntax-cms/src/private/modules/search/results.php.

In future, we'd appreciate a courtesy notification when you post an issue with the application. We'd have had this fixed a lot faster had we known when the vulnerability was reported, instead of seeing the security advisory go by.

Thanks for pointing it out.

7:47 PM

 

Post a Comment

<< Home

 
Copyright (c) 2006 Pridels Sec Crew