<<< Date Index >>>     <<< Thread Index >>>

phpCMS <= 1.2.1 Xss Vulnerability, Information disclosure



Title: phpCMS <= 1.2.1 Xss Vulnerability, Information disclosure
Affects: 
  - <= 1.2.1
Effect: Cross Site Attack (session hijacking, ...)
Id: cbsa-0006
Release Date: 2004/11/26
Author: Cyrille Barthelemy <cb-publicbox@xxxxxxxxxxx>


-- 1. Introduction
------------------------
phpCMS is a content management system, easily configurable with no particular
dependency and very flexible. Please go to [1] to read a complete description 
of the project. The last version, 1.2.1, has been released on 2004, november 
22.

-- 2. Problem
------------------
An implementation error in the validation of the user input lead to an Xss 
vulnerability allowing a user to create cross site attacks, and also disclose 
information about the  server configuration when phpCMS is configured in 
non-stealth mode with debug mode activated.
Example of exploitation :
http://[somehost]/parser/parser.php?file=<script>alert(document.cookie)</script>


The error page display the input supplied by the user, without filtering, and 
the full path to the phpCMS root directory.
Example of exploitation : 
http://[somehost]/parser/parser.php?file=donotexist
=>
phpCMS 1.2.1
Error: 07: could not find file for parsing.
/var/www/localhost/htdocsdonotexists/index.htm
^^^^^^^^^^^^^^^^^^^^^^^^^


-- 3. Solution
------------------
Upgrade to the next version 1.2.1.pl1, available at : 
http://www.phpcms.de/download/index.en.html

_DO NOT_ run your configuration in debug mode with untrusted access.
_DO_ run in file stealth mode.


-- 4. References
---------------------
[1] phpCMS web site
    http://www.phpcms.de/


-- 5. History
----------------
- 2004/11/24 : vulnerability discovered
- 2004/11/24 : vendor notified
- 2004/11/25 : vendor response
- 2004/11/25 : fix released

-- 6. Contact information
----------------------------------
Cyrille Barthelemy <cb-publicbox@xxxxxxxxxxx>
Web Site : http://www.cyrille-barthelemy.com