Title: phpCMS <= 1.2.1 Xss Vulnerability, Information disclosure Affects: - <= 1.2.1 Effect: Cross Site Attack (session hijacking, ...) Id: cbsa-0006 Release Date: 2004/11/26 Author: Cyrille Barthelemy <cb-publicbox@xxxxxxxxxxx> -- 1. Introduction ------------------------ phpCMS is a content management system, easily configurable with no particular dependency and very flexible. Please go to [1] to read a complete description of the project. The last version, 1.2.1, has been released on 2004, november 22. -- 2. Problem ------------------ An implementation error in the validation of the user input lead to an Xss vulnerability allowing a user to create cross site attacks, and also disclose information about the server configuration when phpCMS is configured in non-stealth mode with debug mode activated. Example of exploitation : http://[somehost]/parser/parser.php?file=<script>alert(document.cookie)</script> The error page display the input supplied by the user, without filtering, and the full path to the phpCMS root directory. Example of exploitation : http://[somehost]/parser/parser.php?file=donotexist => phpCMS 1.2.1 Error: 07: could not find file for parsing. /var/www/localhost/htdocsdonotexists/index.htm ^^^^^^^^^^^^^^^^^^^^^^^^^ -- 3. Solution ------------------ Upgrade to the next version 1.2.1.pl1, available at : http://www.phpcms.de/download/index.en.html _DO NOT_ run your configuration in debug mode with untrusted access. _DO_ run in file stealth mode. -- 4. References --------------------- [1] phpCMS web site http://www.phpcms.de/ -- 5. History ---------------- - 2004/11/24 : vulnerability discovered - 2004/11/24 : vendor notified - 2004/11/25 : vendor response - 2004/11/25 : fix released -- 6. Contact information ---------------------------------- Cyrille Barthelemy <cb-publicbox@xxxxxxxxxxx> Web Site : http://www.cyrille-barthelemy.com