Secunia Security Advisory - _MoHaJaLi_ has reported two vulnerabilities in ar-blog, which can be exploited by malicious people to conduct script insertion attacks and bypass certain security restrictions.
deee1388535d3cd87969138e720e0ca26576130082bdb914532c7b3c1ce9a2da
TITLE:
ar-blog Script Insertion and Authentication Bypass Vulnerabilities
SECUNIA ADVISORY ID:
SA17307
VERIFY ADVISORY:
http://secunia.com/advisories/17307/
CRITICAL:
Moderately critical
IMPACT:
Security Bypass, Cross Site Scripting
WHERE:
>From remote
SOFTWARE:
ar-blog 5.x
http://secunia.com/product/5979/
DESCRIPTION:
_MoHaJaLi_ has reported two vulnerabilities in ar-blog, which can be
exploited by malicious people to conduct script insertion attacks and
bypass certain security restrictions.
1) Input passed when adding a comment isn't properly sanitised before
being used. This can be exploited to inject arbitrary HTML and script
code, which will be executed in a user's browser session in context
of an affected site when the malicious comment is viewed.
2) An error caused due to an insecure authentication process can be
exploited to bypass the authentication process and access the
administration section by defining certain cookie parameters.
The vulnerabilities have been reported in version 5.2 and prior.
SOLUTION:
Edit the source code to ensure that input is properly sanitised and
that administrators are properly authenticated.
PROVIDED AND/OR DISCOVERED BY:
_MoHaJaLi_
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------