Lucene search

K
zeroscienceGjoko KrsticZSL-2010-4962
HistorySep 06, 2010 - 12:00 a.m.

MySource Matrix 3.28.3 (height) Remote Reflected XSS Vulnerability

2010-09-0600:00:00
Gjoko Krstic
zeroscience.mk
102

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

AI Score

6.1

Confidence

High

EPSS

0.006

Percentile

78.2%

Title: MySource Matrix 3.28.3 (height) Remote Reflected XSS Vulnerability
Advisory ID: ZSL-2010-4962
Type: Remote
Impact: Cross-Site Scripting
Risk: (2/5)
Release Date: 06.09.2010

Summary

MySource Matrix is a powerful Open Source Content Management System (CMS) written in PHP and is suitable for many types of organisations.

Description

Input passed via the “height” parameter to char_map.php is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user’s browser session in context of an affected site.

--------------------------------------------------------------------------------

182: // <?php echo $_REQUEST['width'];?>; 183: // <?php echo $_REQUEST['height'];?>;
--------------------------------------------------------------------------------

Vendor

Squiz Pty Ltd. - <http://www.matrix.squiz.net/&gt;

Affected Version

3.28.3

Tested On

Microsoft Windows XP Professional SP3 (EN)
PHP 5.3.0
MySQL 5.1.36
Apache 2.2.11 (Win32)

Vendor Status

[05.09.2010] Vulnerability discovered.
[06.09.2010] Vendor contacted.
[06.09.2010] Vendor replied asking details.
[06.09.2010] Sent analysis report to vendor.
[06.09.2010] Vendor verifies vulnerability.
[06.09.2010] Vendor releases fix versions 3.26.8 and 3.28.4.
[06.09.2010] Public advisory released.

PoC

mysource_xss.txt

Credits

Vulnerability discovered by Gjoko Krstic - <[email protected]>

References

[1] <http://matrix.squiz.net/developer/changelogs/3.28.x/3.28.3-3.28.4&gt;
[2] <http://securityreason.com/wlb_show/WLB-2010090027&gt;
[3] <http://secunia.com/advisories/41295/&gt;
[4] <http://osvdb.org/show/osvdb/67838&gt;
[5] <http://www.packetstormsecurity.org/filedesc/ZSL-2010-4962.txt.html&gt;
[6] <http://www.securityfocus.com/bid/43020&gt;
[7] <https://vulners.com/cve/CVE-2010-4901&gt;

Changelog

[06.09.2010] - Initial release
[07.09.2010] - Added reference [2] and [3]
[08.09.2010] - Added reference [4], [5] and [6]
[12.10.2011] - Added reference [7]

Contact

Zero Science Lab

Web: <http://www.zeroscience.mk>
e-mail: [email protected]

<html><body><p>Title:

 MySource Matrix 3.28.3 (height) Remote Reflected XSS Vulnerability




Vendor:

 Squiz Pty Ltd. - http://www.squiz.net
                  http://www.matrix.squiz.net/

Summary:

 MySource Matrix is a powerful Open Source Content Management System
 (CMS) written in PHP and is suitable for many types of organisations.


Description:

 Input passed via the "height" parameter to char_map.php is not properly
 sanitised before being returned to the user. This can be exploited to execute
 arbitrary HTML and script code in a user's browser session in context of an
 affected site.


Tested on:

 MS WinXP Pro SP3 (EN)
 PHP 5.3.0
 MySQL 5.1.36
 Apache 2.2.11 (Win32)


Version affected:

 3.28.3


Vulnerable lines:

 182: // <?php echo $_REQUEST['width'];?>;
 183: // <?php echo $_REQUEST['height'];?>;


Solution:

 Existing users can remove the two commented out lines from:
/path/to/matrix/fudge/wysiwyg/plugins/special_chars/char_map.php (lines 182 and 183)


Vendor status:

 [05.09.2010] Vulnerability discovered.
 [06.09.2010] Vendor contacted.
 [06.09.2010] Vendor replied asking details.
 [06.09.2010] Sent analysis report to vendor.
 [06.09.2010] Vendor verifies vulnerability.
 [06.09.2010] Vendor releases fix versions 3.26.8 and 3.28.4.
 [06.09.2010] Public advisory released.


Vulnerability discovered by:

 Gjoko 'LiquidWorm' Krstic
 liquidworm gmail com
 http://www.zeroscience.mk


Zero Science Lab Advisory ID:

 ZSL-2010-4962


Advisory URL:

 http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4962.php



PoC:

 http://200.200.200.200/fudge/wysiwyg/plugins/special_chars/char_map.php?width=233%3C/script%3E&amp;height=233%3Cscript%3Ealert%28%27zsl%27%29%3C%2fscript%3E
</p></body></html>

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

AI Score

6.1

Confidence

High

EPSS

0.006

Percentile

78.2%

Related for ZSL-2010-4962