Re: XSS vulnerability in WebPress

2010-08-16 Thread security curmudgeon

: Product: WebPress
: Vendor: YWP ( http://www.goywp.com/ ) 
: Vulnerable Version: Current at 01.07.2010 and Probably Prior Versions

The vendor web page has a demo feature, that is powered by YWP 13.00.04. 
Creating a demo via their site, the changelog shows 05.05.2010 - Released 
version 13.00.04. Your version of 01.07.2010 appears to be something you 
designated, based on the date you notified the vendor.

It appears this is a site specific issue in YWP (http://www.goywp.com/).

Can you confirm this is a downloadable product and the version affected?




XSS vulnerability in WebPress

2010-07-15 Thread advisory
Vulnerability ID: HTB22481
Reference: http://www.htbridge.ch/advisory/xss_vulnerability_in_webpress_3.html
Product: WebPress
Vendor: YWP ( http://www.goywp.com/ ) 
Vulnerable Version: Current at 01.07.2010 and Probably Prior Versions
Vendor Notification: 01 July 2010 
Vulnerability Type: XSS (Cross Site Scripting)
Status: Not Fixed, Vendor Alerted, Awaiting Vendor Response
Risk level: Medium 
Credit: High-Tech Bridge SA - Ethical Hacking  Penetration Testing 
(http://www.htbridge.ch/) 

Vulnerability Details:
User can execute arbitrary JavaScript code within the vulnerable application.

The vulnerability exists due to failure in the 
admin_page_accounts_users_action.php script to properly sanitize 
user-supplied input in id_num_mod variable. Successful exploitation of this 
vulnerability could result in a compromise of the application, theft of 
cookie-based authentication credentials, disclosure or modification of 
sensitive data.

An attacker can use browser to exploit this vulnerability. The following PoC is 
available:


http://host/path/_system/accounts/users/_pages/admin_page_accounts_users_action.php?id_num_mod=xxx%3Cscript%3Ealert%28document.cookie%29%3C/script%3Esubmit_action=Edit






XSS vulnerability in WebPress

2010-07-15 Thread advisory
Vulnerability ID: HTB22480
Reference: http://www.htbridge.ch/advisory/xss_vulnerability_in_webpress_2.html
Product: WebPress
Vendor: YWP ( http://www.goywp.com/ ) 
Vulnerable Version: Current at 01.07.2010 and Probably Prior Versions
Vendor Notification: 01 July 2010 
Vulnerability Type: XSS (Cross Site Scripting)
Status: Not Fixed, Vendor Alerted, Awaiting Vendor Response
Risk level: Medium 
Credit: High-Tech Bridge SA - Ethical Hacking  Penetration Testing 
(http://www.htbridge.ch/) 

Vulnerability Details:
User can execute arbitrary JavaScript code within the vulnerable application.

The vulnerability exists due to failure in the 
admin_page_sidemenu_blocks_action.php script to properly sanitize 
user-supplied input in id_num_mod variable. Successful exploitation of this 
vulnerability could result in a compromise of the application, theft of 
cookie-based authentication credentials, disclosure or modification of 
sensitive data.

An attacker can use browser to exploit this vulnerability. The following PoC is 
available:


http://host/path/_system/menus/sidemenu_blocks/_pages/admin_page_sidemenu_blocks_action.php?id_num_mod=1%27%22%3E%3Cscript%3Ealert%28document.cookie%29%3C/script%3Edcfsubmit_action=Edit






XSS vulnerability in WebPress

2010-07-15 Thread advisory
Vulnerability ID: HTB22479
Reference: http://www.htbridge.ch/advisory/xss_vulnerability_in_webpress_1.html
Product: WebPress
Vendor: YWP ( http://www.goywp.com/ ) 
Vulnerable Version: Current at 01.07.2010 and Probably Prior Versions
Vendor Notification: 01 July 2010 
Vulnerability Type: XSS (Cross Site Scripting)
Status: Not Fixed, Vendor Alerted, Awaiting Vendor Response
Risk level: Medium 
Credit: High-Tech Bridge SA - Ethical Hacking  Penetration Testing 
(http://www.htbridge.ch/) 

Vulnerability Details:
User can execute arbitrary JavaScript code within the vulnerable application.

The vulnerability exists due to failure in the 
admin_page_listings_entries_amd_form.php script to properly sanitize 
user-supplied input in range_listing_id variable. Successful exploitation of 
this vulnerability could result in a compromise of the application, theft of 
cookie-based authentication credentials, disclosure or modification of 
sensitive data.

An attacker can use browser to exploit this vulnerability. The following PoC is 
available:


http://host/path/_system/listings/entries/_pages/admin_page_listings_entries_amd_form.php?range_listing_id=1%27%22%3E%3Cscript%3Ealert%28document.cookie%29%3C/script%3Elisting_id=1






XSS vulnerability in WebPress

2010-07-15 Thread advisory
Vulnerability ID: HTB22478
Reference: http://www.htbridge.ch/advisory/xss_vulnerability_in_webpress.html
Product: WebPress
Vendor: YWP ( http://www.goywp.com/ ) 
Vulnerable Version: Current at 01.07.2010 and Probably Prior Versions
Vendor Notification: 01 July 2010 
Vulnerability Type: XSS (Cross Site Scripting)
Status: Not Fixed, Vendor Alerted, Awaiting Vendor Response
Risk level: Medium 
Credit: High-Tech Bridge SA - Ethical Hacking  Penetration Testing 
(http://www.htbridge.ch/) 

Vulnerability Details:
User can execute arbitrary JavaScript code within the vulnerable application.

The vulnerability exists due to failure in the 
admin_page_listings_lists_action.php script to properly sanitize 
user-supplied input in id_num_mod variable. Successful exploitation of this 
vulnerability could result in a compromise of the application, theft of 
cookie-based authentication credentials, disclosure or modification of 
sensitive data.

An attacker can use browser to exploit this vulnerability. The following PoC is 
available:


http://host/path/_system/listings/lists/_pages/admin_page_listings_lists_action.php?id_num_mod=1%27%22%3E%3Cscript%3Ealert%28document.cookie%29%3C/script%3Esubmit_action=Edit