what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

major_rls45.txt

major_rls45.txt
Posted Apr 17, 2007
Authored by David "Aesthetico" Vieira-Kurz | Site majorsecurity.de

oe2edit CMS suffers from cross site scripting and cookie manipulation vulnerabilities.

tags | advisory, vulnerability, xss
SHA-256 | 1d545e67b993df013f9a00de25830766a799b8b03071712d0eae874b63679455

major_rls45.txt

Change Mirror Download
[MajorSecurity Advisory #45]oe2edit CMS - Cross Site Scripting and Cookie Manipulation Issue

Details
=======
Product: oe2edit CMS
Security-Risk: moderated
Remote-Exploit: yes
Vendor-URL: http://www.oe2edit.com
Vendor-Status: informed
Advisory-Status: published

Credits
============
Discovered by: David Vieira-Kurz
http://www.majorsecurity.de

Original Advisory:
============
http://www.majorsecurity.de/index_2.php?major_rls=major_rls45

Introduction
============
oe2edit is a German Content Management System.

More Details
============
Cross Site Scripting:
Input passed directly to the "q" parameter in "oe2edit.cgi" is not properly sanitised before being returned to the user.
This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

Cookie Manipulation:
Input passed directly to the "q" parameter in "oe2edit.cgi" is not properly sanitised before being returned to the user.
This can be exploited to inject custom META tags to alter the cookies stored in the browser, set custom cookies and to modify the cookie information.

Workaround
=============
Edit the source code to ensure that input is properly sanitised.
You should work with "htmlspecialchars()" or "htmlentities()" php-function to ensure that html tags
are not going to be executed.

Example:
$q = htmlspecialchars($_POST['q']);
$test = htmlentities($_GET['test']);
?>

History/Timeline
================
07.04.2007 discovery of the vulnerability
08.04.2007 additional tests with other versions
09.04.2007 contacted the vendor
15.04.2007 advisory is written
15.04.2007 advisory released

MajorSecurity
=======
MajorSecurity is a non-profit German penetration testing and security research project
which consists of only one person at the present time.
http://www.majorsecurity.de/
Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close