oss-sec mailing list archives

Re: CVE-request: Elxis CMS two XSS-vulnerabilities


From: Kurt Seifried <kseifrie () redhat com>
Date: Sat, 31 Dec 2011 14:20:01 -0700

On 12/30/2011 04:49 AM, Henri Salo wrote:
1) Input passed to the "task" parameter in index.php (when "option" is set to "com_content") is not properly 
sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a 
user's browser session in context of an affected site.
http://osvdb.org/show/osvdb/77563

2) Input passed via the URL to administrator/index.php is not properly sanitised before being returned to the user. 
This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected 
site.
http://osvdb.org/show/osvdb/77564
Merging these two issues as per ADT4:

At this stage, X and Y are the same bug type, affect the same versions,
and affect the same products.

Do X and Y have any of the following characteristics?

  * X appears in a different DLL, library, or program than Y (e.g. X
    affects LIB1.DLL and Y affects LIB2.DLL)
  * X has more serious impact than Y (e.g. code execution as root versus
    leak of system pathname)
  * X takes a different input parameter/argument than Y (e.g. SQL
    injection in both the "user" and "password" parameters)
  * X is exploitable locally, but Y is not.
  * X requires stronger authentication than Y.
  * X can be exploited by a certain user that Y can not (e.g. a guest
    user vs. an admin)

*Yes:* *MERGE

*Please use CVE-2011-4918 for these two issues
*
*

http://secunia.com/advisories/47073/

Fixed in same version "2009.3 Aphrodite rev2684" so one CVE-identifier might be enough.

- Henri Salo
Does anyone have a contact name for Secunia with respect to
co-ordinating CVE assignments better?

-- 

-- Kurt Seifried / Red Hat Security Response Team


Current thread: