[MajorSecurity Advisory #29]foresite CMS - Cross Site Scripting Issue

2006-10-31T00:00:00
ID SECURITYVULNS:DOC:14859
Type securityvulns
Reporter Securityvulns
Modified 2006-10-31T00:00:00

Description

[MajorSecurity Advisory #29]foresite CMS - Cross Site Scripting Issue

Details

Product: ForeSite CMS Security-Risk: moderated Remote-Exploit: yes Vendor-URL: http://www.foresite.ch Vendor-Status: informed Advisory-Status: published

Credits

Discovered by: David Vieira-Kurz http://www.majorsecurity.de

Original Advisory:

http://www.majorsecurity.de/index_2.php?major_rls=major_rls29

Introduction

foresite CMS is a content management system.

More Details

XSS: Input passed directly to the "query" parameter in "search_de.html" is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

Fix

None

Solution

Edit the source code to ensure that input is properly sanitised. You should work with "htmlspecialchars()" or "htmlentities()" php-function to ensure that html tags are not going to be executed. Further it is recommend to set off the "register globals" option in the "php.ini" on your webserver.

Example: $pass = htmlentities($_POST['pass']); $test = htmlspecialchars($_GET('test')); $id = intval($_POST['id']); ?>

History/Timeline

18.08.2006 discovery of the vulnerability 19.08.2006 additional tests with other versions 20.08.2006 contacted the vendor 05.09.2006 after 2 weeks the vendor didn't response 05.09.2006 contacted the vendor again 05.10.2006 vendor didn't response 27.10.2006 advisory is written 29.10.2006 advisory released

MajorSecurity

MajorSecurity is a German penetration testing and hacking security project which consists of only one person at the present time. I am looking for a partnership. You can find more Information on the MajorSecurity Project at http://www.majorsecurity.de/