Cross Site Scripting (XSS) Vulnerabilitiy in fuzzylime (cms) >=3.02,
CVE-2008-3098 

References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3098
http://cms.fuzzylime.co.uk


Description

Fuzzylime (cms) is a way to run websites and keep it up-to-date. Once
installed, you can update from any internet-connected PC in the world -
you don't even need to know HTML! It has tons of features so whatever
you want from your site, chances are this script will be able to do it
for you. 

Example

Assuming Fuzzylime is installed on http://localhost/fuzzylime/, anybody
could inject JavaScript:

<form method="post" action="http://localhost/fuzzylime/admin/usercheck.php";>
<input type="hidden" name="log" value="in">
<input type="text" name="user"value='"><script>alert(1)</script>'>
<input type=submit></form>

Disclosure Timeline

2008-09-10 Vendor contacted
2008-09-20 Vendor released 3.03
2008-09-22 Advisory published

CVE Information

The Common Vulnerabilities and Exposures (CVE) project has assigned the
name CVE-2008-3098 to this issue. This is a candidate for inclusion in
the CVE list (http://cve.mitre.org/), which standardizes names for
security problems. 

Credits and copyright

This vulnerability was discovered by Fabian Fingerle (published with
help from Hanno Boeck). It's licensed under the creative commons
attribution license.

Fabian Fingerle, 2008-09-22, http://www.fabian-fingerle.de

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to