Тимот на Zen Ventures (http://www.zen-cart.com) во соработка со Zero Science Lab, објави безбедносни закрпи за заштита на своите корисници. Најновата верзија, 1.3.9g, објавена на 29.09.2010 е подобрената верзија од 1.3.9f, во која имаше ранливости од типот XSS, SQLi и LFI/FD.
Zen Cart безбедносни предупредувања и закрпи
;)
30 September, 2010
15 September, 2010
06 September, 2010
MySource Matrix 3.28.3 (height) Remote Reflected XSS Vulnerability
Title:
MySource Matrix 3.28.3 (height) Remote Reflected XSS Vulnerability
Vendor:
Squiz Pty Ltd. - http://www.squiz.net
http://www.matrix.squiz.net/
Summary:
MySource Matrix is a powerful Open Source Content Management System
(CMS) written in PHP and is suitable for many types of organisations.
Description:
Input passed via the "height" parameter to char_map.php is not properly
sanitised before being returned to the user. This can be exploited to execute
arbitrary HTML and script code in a user's browser session in context of an
affected site.
Tested on:
MS WinXP Pro SP3 (EN)
PHP 5.3.0
MySQL 5.1.36
Apache 2.2.11 (Win32)
Version affected:
3.28.3
Vulnerable lines:
182: // <?php echo $_REQUEST['width'];?>;
183: // <?php echo $_REQUEST['height'];?>;
Solution:
Existing users can remove the two commented out lines from:
/path/to/matrix/fudge/wysiwyg/plugins/special_chars/char_map.php (lines 182 and 183)
Vendor status:
[05.09.2010] Vulnerability discovered.
[06.09.2010] Vendor contacted.
[06.09.2010] Vendor replied asking details.
[06.09.2010] Sent analysis report to vendor.
[06.09.2010] Vendor verifies vulnerability.
[06.09.2010] Vendor releases fix versions 3.26.8 and 3.28.4.
[06.09.2010] Public advisory released.
Vulnerability discovered by:
Gjoko 'LiquidWorm' Krstic
liquidworm gmail com
http://www.zeroscience.mk
Zero Science Lab Advisory ID:
ZSL-2010-4962
Advisory URL:
http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4962.php
PoC:
http://200.200.200.200/fudge/wysiwyg/plugins/special_chars/char_map.php?width=233%3C/script%3E&height=233%3Cscript%3Ealert%28%27zsl%27%29%3C%2fscript%3E
MySource Matrix 3.28.3 (height) Remote Reflected XSS Vulnerability
Vendor:
Squiz Pty Ltd. - http://www.squiz.net
http://www.matrix.squiz.net/
Summary:
MySource Matrix is a powerful Open Source Content Management System
(CMS) written in PHP and is suitable for many types of organisations.
Description:
Input passed via the "height" parameter to char_map.php is not properly
sanitised before being returned to the user. This can be exploited to execute
arbitrary HTML and script code in a user's browser session in context of an
affected site.
Tested on:
MS WinXP Pro SP3 (EN)
PHP 5.3.0
MySQL 5.1.36
Apache 2.2.11 (Win32)
Version affected:
3.28.3
Vulnerable lines:
182: // <?php echo $_REQUEST['width'];?>;
183: // <?php echo $_REQUEST['height'];?>;
Solution:
Existing users can remove the two commented out lines from:
/path/to/matrix/fudge/wysiwyg/plugins/special_chars/char_map.php (lines 182 and 183)
Vendor status:
[05.09.2010] Vulnerability discovered.
[06.09.2010] Vendor contacted.
[06.09.2010] Vendor replied asking details.
[06.09.2010] Sent analysis report to vendor.
[06.09.2010] Vendor verifies vulnerability.
[06.09.2010] Vendor releases fix versions 3.26.8 and 3.28.4.
[06.09.2010] Public advisory released.
Vulnerability discovered by:
Gjoko 'LiquidWorm' Krstic
liquidworm gmail com
http://www.zeroscience.mk
Zero Science Lab Advisory ID:
ZSL-2010-4962
Advisory URL:
http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4962.php
PoC:
http://200.200.200.200/fudge/wysiwyg/plugins/special_chars/char_map.php?width=233%3C/script%3E&height=233%3Cscript%3Ealert%28%27zsl%27%29%3C%2fscript%3E
02 September, 2010
Subscribe to:
Posts (Atom)