############################################ bcoos & E-xoops DevTracker module two variables XSS vendor url: http://www.bcoos.net Vendor url: http://www.e-xoops.com Advisore: http://lostmon.blogspot.com/2008/02/ bcoos-and-e-xoops-devtracker-module-two.html vendor notify:yes exploits available: YES ############################################ bcoos and E-xoops are two content-community management system written in PHP-MySQL. bcoos and E-xoops contains a flaw that allows a remote cross site scripting attack.This flaw exists because the application does not validate 'order_by' & 'direction' variables upon submission to 'index.php' script in DevTracker module.This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server,leading loss ofintegrity ################# Versions: ################# bcoos =< 1.1.11 DevTracker (¿ 3.0 ?) E-xoops =< 1.0.8 DevTracker v0.20 And posible early versions with this module instaled. Here you have a src reference for E-xoops 1.0.8 http://phpxref.com/xref/exoops/nav.html ################# Solution: ################# No solution available at this time Try to edit the source code. ################# Timeline: ################# Discovered:01-02-2008 vendor notify:03-02-2008 vendor response:------- disclosure:04-02-2007 ############# Examples ############# http://[victim]/modules/devtracker/index.php?proj_id=1&order_by= priority&direction=ASCquot;> http://[Victim]/modules/devtracker/index.php?proj_id=1 &order_by=priorityquot;> &direction=ASC #######################€nd################### Thnx to estrella to be my ligth Thnx To FalconDeOro for his support Thnx To Imydes From http://www.imydes.com Atentamente: Lostmon (lostmon@gmail.com) Web-Blog: http://lostmon.blogspot.com/ Google group: http://groups.google.com/group/lostmon (new) -- La curiosidad es lo que hace mover la mente....