=============================================================== Vulnerability ID: HTB22494 Reference: http://www.htbridge.ch/advisory/xss_vulnerability_in_campsite.html Product: Campsite Vendor: Sourcefabric o.p.s ( http://www.sourcefabric.org/ ) Vulnerable Version: 3.3.6 and Probably Prior Versions Vendor Notification: 16 July 2010 Vulnerability Type: XSS (Cross Site Scripting) Status: Fixed by Vendor Risk level: Medium Credit: High-Tech Bridge SA - Ethical Hacking & Penetration Testing (http://www.htbridge.ch/) Vulnerability Details: User can execute arbitrary JavaScript code within the vulnerable application. The vulnerability exists due to failure in the "/admin/comments/index.php" script to properly sanitize user-supplied input in "f_comment_search" variable. Successful exploitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data. An attacker can use browser to exploit this vulnerability. The following PoC is available:
Solution: Upgrade to the most recent version =============================================================== Vulnerability ID: HTB22495 Reference: http://www.htbridge.ch/advisory/xss_vulnerability_in_campsite_1.html Product: Campsite Vendor: Sourcefabric o.p.s ( http://www.sourcefabric.org/ ) Vulnerable Version: 3.3.6 and Probably Prior Versions Vendor Notification: 16 July 2010 Vulnerability Type: XSS (Cross Site Scripting) Status: Not Fixed, Vendor Alerted, Awaiting Vendor Response Risk level: Medium Credit: High-Tech Bridge SA - Ethical Hacking & Penetration Testing (http://www.htbridge.ch/) Vulnerability Details: User can execute arbitrary JavaScript code within the vulnerable application. The vulnerability exists due to failure in the "/admin/system_pref/do_edit.php" script to properly sanitize user-supplied input in "f_site_title" variable. Successful exploitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data. An attacker can use browser to exploit this vulnerability. The following PoC is available: http://host/admin/system_pref/do_edit.php?f_campsite_online=Y&f_site_title=Kora">&f_site_metakeywords=11&f_site_metadescription=22&f_cache_enabled=N&f_cache_engine=APC&f_imagecache_lifetime=86400&f_secret_key=1&f_session_lifetime=1400&f_keyword_separator=%2C&f_login_num=3&f_max_upload_filesize=16M&f_smtp_host=localhost&f_smtp_port=25&f_editor_image_ratio=100&f_external_subs_management=N&f_use_replication=N&f_db_repl_host=&f_db_repl_user=&f_db_repl_pass=&f_db_repl_port=3306&f_use_campcaster=N&f_cc_hostname=localhost&f_cc_hostport=80&f_cc_xrpcpath=%2Fcampcaster%2FstorageServer%2Fvar%2Fxmlrpc%2F&f_cc_xrpcfile=xrLocStor.php&f_template_filter=.*%2C+CVS&save=%D0%A1%D0%BE%D1%85%D1%80%D0%B0%D0%BD%D0%B8%D1%82%D1%8C HTTP/1.1