exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Telligent Community Server 5.x Cross Site Scripting

Telligent Community Server 5.x Cross Site Scripting
Posted Aug 4, 2011
Authored by Gabriel Lima

Telligent Community Server version 5.x suffers from multiple stored and reflected cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 34fa5fa62fc1c5f83cb2b324c3d252bc5d58128d95559f31576161f61015156b

Telligent Community Server 5.x Cross Site Scripting

Change Mirror Download
Editor's note: 4 Advisories are grouped together here.

=======================================================================
*Community Server - Stored Cross-site Scripting in user's signature.
*
- Product description:
Community Server is a communities and collaboration web application
developed by Telligent.
It uses ASP.NET platform (C#) and Microsoft SQL Server database. From it's
5.0 version, the software was renamed to Telligent Community.


- Vulnerability Details:
It is possible to insert scripts (Cross-site Scripting) in user's signature,
using BBCode Tag's processing errors.


- Proof of Concept:
Set an user's signature to:

[img]invalid.jpg[url= onerror=alert(1) z=] a[/url][/img]

An alert will be show in every topic the user posts in and also in its
profile.


- Affected Versions:
Community Server 2007
(may affect others)


- Unaffected Versions:
Telligent Community 5.x or earlier


- Timeline:
[05/25/10] Vulnerability details sent to address for security related
contacts present at company's website, although the address did not exist.
[05/26/10] Ticket opened asking for contact to send off vulnerability
details.
[05/26/10] Ticket's answer received, containing e-mail for the sending of
vulnerability details.
[05/26/10]Vulnerability details sent.
[05/26/10] Answer received informing that vulnerability did not exist on
latest versions of the product.
[07/15/11] Advisory published.

- Credits:
PontoSec - Segurança da Informação < http://www.pontosec.com > - Researcher:
Gabriel Lima (gabriel <at> pontosec.com)



=======================================================================
Community Server - Reflected Cross-Site Scripting - TagSelector.aspx

- Product description:
Community Server is a communities and collaboration web application
developed by Telligent.
It uses ASP.NET platform (C#) and Microsoft SQL Server database. From
it's 5.0 version, the software was renamed to Telligent Community.

- Vulnerability Details:
It is possible to insert scripts at the page (Cross-site Scripting)
through the TagEditor parameter (GET) from /utility/TagSelector.aspx.

- Proof of Concept:
When accessing the TagSelector.aspx file, setting the TagEditor value
as “ ‘);%0Aalert(1);</script> ”, an alert box containing a number 1
appears, confirming the vulnerability.

Example: http://site.example/utility/TagSelector.aspx?TagEditor=’);%0Aalert(1);</script>


- Affected Versions:
Community Server 2007
Community Server 2008
(may affect others)

- Unaffected Versions:
Telligent Community 5.x or earlier

- Timeline:
[05/25/10] Vulnerability details sent to address for security related
contacts present at company's website, although the address did not
exist.
[05/26/10] Ticket opened asking for contact to send off vulnerability details.
[05/26/10] Ticket's answer received, containing e-mail for the sending
of vulnerability details.
[05/26/10] Vulnerability details sent.
[05/26/10] Answer received informing that vulnerability did not exist
on latest versions of the product.
[07/15/11] Advisory published.

Credits:
PontoSec - Segurança da Informação < http://www.pontosec.com > -
Researcher: Gabriel Lima (gabriel <at> pontosec.com)


=======================================================================
Community Server - Reflected Cross-Site Scripting - TagSelector.aspx

- Product description:
Community Server is a communities and collaboration web application
developed by Telligent.
It uses ASP.NET platform (C#) and Microsoft SQL Server database. From
it's 5.0 version, the software was renamed to Telligent Community.

- Vulnerability Details:
It is possible to insert scripts at the page (Cross-site Scripting)
through the TagEditor parameter (GET) from /utility/TagSelector.aspx.

- Proof of Concept:
When accessing the TagSelector.aspx file, setting the TagEditor value
as “ ‘);%0Aalert(1);</script> ”, an alert box containing a number 1
appears, confirming the vulnerability.

Example: http://site.example/utility/TagSelector.aspx?TagEditor=’);%0Aalert(1);</script>


- Affected Versions:
Community Server 2007
Community Server 2008
(may affect others)

- Unaffected Versions:
Telligent Community 5.x or earlier

- Timeline:
[05/25/10] Vulnerability details sent to address for security related
contacts present at company's website, although the address did not
exist.
[05/26/10] Ticket opened asking for contact to send off vulnerability details.
[05/26/10] Ticket's answer received, containing e-mail for the sending
of vulnerability details.
[05/26/10] Vulnerability details sent.
[05/26/10] Answer received informing that vulnerability did not exist
on latest versions of the product.
[07/15/11] Advisory published.

Credits:
PontoSec - Segurança da Informação < http://www.pontosec.com > -
Researcher: Gabriel Lima (gabriel <at> pontosec.com)



=======================================================================
Community Server - Stored Cross-site Scripting in user's signature.

- Product description:
Community Server is a communities and collaboration web application
developed by Telligent.
It uses ASP.NET platform (C#) and Microsoft SQL Server database. From
it's 5.0 version, the software was renamed to Telligent Community.


- Vulnerability Details:
It is possible to insert scripts (Cross-site Scripting) in user's
signature, using BBCode Tag's processing errors.


- Proof of Concept:
Set an user's signature to:

[img]invalid.jpg[url= onerror=alert(1) z=] a[/url][/img]

An alert will be show in every topic the user posts in and also in its profile.


- Affected Versions:
Community Server 2007
(may affect others)


- Unaffected Versions:
Telligent Community 5.x or earlier


- Timeline:
[05/25/10] Vulnerability details sent to address for security related
contacts present at company's website, although the address did not
exist.
[05/26/10] Ticket opened asking for contact to send off vulnerability details.
[05/26/10] Ticket's answer received, containing e-mail for the sending
of vulnerability details.
[05/26/10]Vulnerability details sent.
[05/26/10] Answer received informing that vulnerability did not exist
on latest versions of the product.
[07/15/11] Advisory published.

- Credits:
PontoSec - Segurança da Informação < http://www.pontosec.com > -
Researcher: Gabriel Lima (gabriel <at> pontosec.com)
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close