Digital Security Research Group [DSecRG] Advisory Name: 2z project Systems Affected: 2z project 0.9.6.1 Vendor URL: http://2z-project.ru Authors: Alexandr Polyakov, Stas Svistunovich Digital Security Reasearch Group [DSecRG] (research [at] dsec [dot] ru) Reported: 27.12.2007 Vendor response: 27.12.2007 Date of Public Advisory: 28.12.2007 Description *********** 2z system has multiple security vulnerabilities: 1. Stored XSS 2. Linked XSS 3. Image XSS 4. Path disclosure 5. Vulnerable Password changing algorithm Details ******* 1. Multiple Stored XSS 1.1 Vulnerability in script http://[server]/[installdir]/?action=addnews in post parameters: parameter name = contentshort parameter name = contentfull Example: contentshort= contentfull= 1.2 Vulnerability in script http://[server]/[installdir]/2z/admin.php?mod=pm&action=write parameter name = content Example: content= --------------------------------------------------- 2. Linked XSS Vulnerability in page index.php. Working only if user not logged in. So it can be used for Phishing (see Example). Template /templates/default/usermenu.tpl have vulnetability parameter "referer". This template included to index.php, so it can be used for Phishing. Source code of usermenu.tpl: ---------------------------------------
<-- html code injected into {request_uri} .. .. .. --------------------------------------- Example: http://[server]/[installdir]/?"/>