CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
AI Score
Confidence
High
EPSS
Percentile
78.2%
Title: MySource Matrix 3.28.3 (height) Remote Reflected XSS Vulnerability
Advisory ID: ZSL-2010-4962
Type: Remote
Impact: Cross-Site Scripting
Risk: (2/5)
Release Date: 06.09.2010
MySource Matrix is a powerful Open Source Content Management System (CMS) written in PHP and is suitable for many types of organisations.
Input passed via the “height” parameter to char_map.php is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user’s browser session in context of an affected site.
--------------------------------------------------------------------------------
182: // <?php echo $_REQUEST['width'];?>; 183: // <?php echo $_REQUEST['height'];?>;
--------------------------------------------------------------------------------
Squiz Pty Ltd. - <http://www.matrix.squiz.net/>
3.28.3
Microsoft Windows XP Professional SP3 (EN)
PHP 5.3.0
MySQL 5.1.36
Apache 2.2.11 (Win32)
[05.09.2010] Vulnerability discovered.
[06.09.2010] Vendor contacted.
[06.09.2010] Vendor replied asking details.
[06.09.2010] Sent analysis report to vendor.
[06.09.2010] Vendor verifies vulnerability.
[06.09.2010] Vendor releases fix versions 3.26.8 and 3.28.4.
[06.09.2010] Public advisory released.
Vulnerability discovered by Gjoko Krstic - <[email protected]>
[1] <http://matrix.squiz.net/developer/changelogs/3.28.x/3.28.3-3.28.4>
[2] <http://securityreason.com/wlb_show/WLB-2010090027>
[3] <http://secunia.com/advisories/41295/>
[4] <http://osvdb.org/show/osvdb/67838>
[5] <http://www.packetstormsecurity.org/filedesc/ZSL-2010-4962.txt.html>
[6] <http://www.securityfocus.com/bid/43020>
[7] <https://vulners.com/cve/CVE-2010-4901>
[06.09.2010] - Initial release
[07.09.2010] - Added reference [2] and [3]
[08.09.2010] - Added reference [4], [5] and [6]
[12.10.2011] - Added reference [7]
Zero Science Lab
Web: <http://www.zeroscience.mk>
e-mail: [email protected]
<html><body><p>Title:
MySource Matrix 3.28.3 (height) Remote Reflected XSS Vulnerability
Vendor:
Squiz Pty Ltd. - http://www.squiz.net
http://www.matrix.squiz.net/
Summary:
MySource Matrix is a powerful Open Source Content Management System
(CMS) written in PHP and is suitable for many types of organisations.
Description:
Input passed via the "height" parameter to char_map.php is not properly
sanitised before being returned to the user. This can be exploited to execute
arbitrary HTML and script code in a user's browser session in context of an
affected site.
Tested on:
MS WinXP Pro SP3 (EN)
PHP 5.3.0
MySQL 5.1.36
Apache 2.2.11 (Win32)
Version affected:
3.28.3
Vulnerable lines:
182: // <?php echo $_REQUEST['width'];?>;
183: // <?php echo $_REQUEST['height'];?>;
Solution:
Existing users can remove the two commented out lines from:
/path/to/matrix/fudge/wysiwyg/plugins/special_chars/char_map.php (lines 182 and 183)
Vendor status:
[05.09.2010] Vulnerability discovered.
[06.09.2010] Vendor contacted.
[06.09.2010] Vendor replied asking details.
[06.09.2010] Sent analysis report to vendor.
[06.09.2010] Vendor verifies vulnerability.
[06.09.2010] Vendor releases fix versions 3.26.8 and 3.28.4.
[06.09.2010] Public advisory released.
Vulnerability discovered by:
Gjoko 'LiquidWorm' Krstic
liquidworm gmail com
http://www.zeroscience.mk
Zero Science Lab Advisory ID:
ZSL-2010-4962
Advisory URL:
http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4962.php
PoC:
http://200.200.200.200/fudge/wysiwyg/plugins/special_chars/char_map.php?width=233%3C/script%3E&height=233%3Cscript%3Ealert%28%27zsl%27%29%3C%2fscript%3E
</p></body></html>