'Seo Panel' Cookie-Rendered Persistent XSS Vulnerability (CVE-2010-4331)

2011-01-18T00:00:00
ID SECURITYVULNS:DOC:25496
Type securityvulns
Reporter Securityvulns
Modified 2011-01-18T00:00:00

Description

'Seo Panel' Cookie-Rendered Persistent XSS Vulnerability (CVE-2010-4331) Mark Stanislav - mark.stanislav@gmail.com

I. DESCRIPTION

A vulnerability exists in 'Seo Panel' page rendering which allows for unfiltered, unencrypted content to be presented to a user through two different cookies.

II. TESTED VERSION

2.2.0

III. PoC EXPLOIT

Alter the value of cookies called 'default_news' or 'sponsors' and then view a site page which includes controllers/index.ctrl.php or controllers/settings.ctrl.php that will render the cookies as they exist on the user's machine.

IV. NOTES

  • The 'default_news' cookie doesn't require a user to be authenticated whereas 'sponsors' does
  • The disclosure date was pushed a full month so that a fix could be released but no update was released yet
  • Based on discussions with the developer, they will likely encrypt the cookie contents to prevent this issue

V. SOLUTION

Upgrade to a release > 2.2.0 when available or otherwise disable cookie rendering.

VI. REFERENCES

http://www.seopanel.in/ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4331 http://www.uncompiled.com/2011/01/seo-panel-cookie-rendered-persistent-xss-vulnerability-cve-2010-4331/

VII. TIMELINE

11/24/2010 - Initial vendor disclosure 11/25/2010 - Vendor response and commitment to fix 11/25/2010 - Reply to vendor detailing potential fixes and an adjusted public disclosure date 11/25/2010 - Vendor response confirming desired public disclosure date and agreement to patch method 01/15/2011 - Public disclosure