|
|
|
|
| |
Credit:
The information has been provided by n.runs AG.
|
| |
Vulnerable Systems:
* Horde version 3.1 and newer
* Horde version 3.2.1 and prior
* Popoon/Flux-CMS version r22196 and prior
* Cake-PHP version 1.2.x.x_18.08.2008 (nightly) and prior
* phpMyFAQ version 2.5.0-dev (2008-08-18) and prior
* deluxeBB version 1.2 and prior
* emucms version 0.3 and prior
* SimpleSite version 1.6.4 and prior
* RevokeBB version 1.0RC11_normal and prior
* TPLN version 2.9 and prior
* Logicoder version r27 and prior
* phour version r106 and prior
* MDPro version 1.0821 and prior
* noserub version r784/0.6 and prior
The XSS filter fails to fully sanitize the user data. In particular, this filter fails to protect against a special character which Microsoft Internet Explorer and Mozilla Firefox is interpreting it as a valid space character.
Impact:
This circumstance allows to bypass the filter and to apply Cross-Site Scripting.
Solution:
For detailed information about the fixes, follow this link.
Vendor communication:
2008/07/25 - Bug found and PoC preparation
2008/07/26 - Vulnerability report submitted via oCert online-form
2008/08/05 - oCert confirmed the submission. oCert starts the coordination of affected authors/vendors
2008/09/06 - oCert informs all parties about the advisory release date
2008/09/11 - n.runs AG releases this advisory in coordination with oCert
CVE Information:
CVE-2008-3824
|
|
|
|
|