OpenCms XSS vuln.

2005-12-21T00:00:00
ID SECURITYVULNS:DOC:10772
Type securityvulns
Reporter Securityvulns
Modified 2005-12-21T00:00:00

Description

OpenCms XSS vuln.

Vuln. discovered by : r0t Date: 21 dec. 2005 orginal advisory:http://pridels.blogspot.com/2005/12/opencms-xss-vuln.html vendor:http://www.opencms.org/ affected version:6.0.3 and prior

Product Description:

OpenCms is a professional level Open Source Website Content Management System. OpenCms helps to create and manage complex websites easily without knowledge of html. An integrated WYSIWYG editor with a user interface similar to well known office applications helps the user creating the contents, while a sophisticated template engine enforces a site-wide corporate layout. As true Open Source software, OpenCms is completely free of licensing costs. OpenCms is based on Java and XML technology. Therefore it fits perfectly into almost any existing modern IT infrastructure. OpenCms runs in a "full open source" environment ( e.g. Linux, Apache, Tomcat, MySQL) as well as on commercial components (e.g. Windows NT, IIS, BEA Weblogic, Oracle DB).

Vuln. Description:

OpenCms contains a flaw that allows a remote cross site scripting attack. This flaw exists because input passed to search module paremters isn't properly sanitised before being returned to the user. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution: Edit the source code to ensure that input is properly sanitised.