vulnerability in cmsms 1.0.2

A place to discuss the testing process in beta cycles or against SVN for the CMS Made Simple CORE package.
Locked
NomadSoul
Forum Members
Forum Members
Posts: 24
Joined: Tue Jul 25, 2006 12:45 am

vulnerability in cmsms 1.0.2

Post by NomadSoul »

hi,

I read a security news here: http://www.frsirt.com/english/advisories/2007/0027
about a CMS Made Simple "searchinput" Parameter Handling Cross Site Scripting Vulnerability in CMS Made Simple version 1.0.2

I didn't find any information about that problem in forum...? how to avoid it?
Dee
Power Poster
Power Poster
Posts: 1197
Joined: Sun Mar 19, 2006 8:46 pm

Re: vulnerability in cmsms 1.0.2

Post by Dee »

Ted
Power Poster
Power Poster
Posts: 3329
Joined: Fri Jun 11, 2004 6:58 pm

Re: vulnerability in cmsms 1.0.2

Post by Ted »

1.0.3 will be released this week (if it tests well) to address this problem.
szevvy

Re: vulnerability in cmsms 1.0.2

Post by szevvy »

The full report is at http://seclists.org/bugtraq/2007/Jan/0137.html, it includes instructions on how to fix it - which might be a good idea until the next version comes out.

It's not just a search vulnerability, it also lets people into your admin...so patch :D
Ted
Power Poster
Power Poster
Posts: 3329
Joined: Fri Jun 11, 2004 6:58 pm

Re: vulnerability in cmsms 1.0.2

Post by Ted »

Yes, I agree.  You should patch these if you get a chance.  Though...  they're not critical flaws.  They're non-permanent XSS vulnerabilities.  They can't harm the system, let anyone into your admin or do anything else.  That's why I haven't rushed 1.0.3 out the door.  If they were any more serious, I would have expedited a patch as soon as I found out about it.
User avatar
kermit
Power Poster
Power Poster
Posts: 693
Joined: Thu Jan 26, 2006 11:46 am

Re: vulnerability in cmsms 1.0.2

Post by kermit »

Ted wrote: Yes, I agree.  You should patch these if you get a chance.  Though...  they're not critical flaws.  They're non-permanent XSS vulnerabilities.  They can't harm the system, let anyone into your admin or do anything else.  That's why I haven't rushed 1.0.3 out the door.  If they were any more serious, I would have expedited a patch as soon as I found out about it.
so these aren't critical to fix?  i have a 1.02 site that kinda blew up on me when i tried to upgrade it to 1.04. had to reinstall 1.02 and restore a db backup from that version... i don't really want to try that again for a bit unless i absolutely have to.
eternity (n); 1. infinite time, 2. a seemingly long or endless time, 3. the length of time it takes a frozen pizza to cook when you're starving.
4,930,000,000 (n); 1. a very large number, 2. the approximate world population in 1986 when Microsoft Corp issued its IPO. 3. Microsoft's net profit (USD) for the quarter (3 months) ending 31 March 2007.
CMSMS migration and setup services | Hosting with CMSMS installed and ready to go | PM me for Info
Dee
Power Poster
Power Poster
Posts: 1197
Joined: Sun Mar 19, 2006 8:46 pm

Re: vulnerability in cmsms 1.0.2

Post by Dee »

They're not "critical", as Ted explained. I would advice to patch them manually though (not too much work, add some htmlentities calls, see the link in the post by szevvy.

Regards,
D
User avatar
kermit
Power Poster
Power Poster
Posts: 693
Joined: Thu Jan 26, 2006 11:46 am

Re: vulnerability in cmsms 1.0.2

Post by kermit »

Dee wrote: They're not "critical", as Ted explained. I would advice to patch them manually though (not too much work, add some htmlentities calls, see the link in the post by szevvy.
did that.. thx.
eternity (n); 1. infinite time, 2. a seemingly long or endless time, 3. the length of time it takes a frozen pizza to cook when you're starving.
4,930,000,000 (n); 1. a very large number, 2. the approximate world population in 1986 when Microsoft Corp issued its IPO. 3. Microsoft's net profit (USD) for the quarter (3 months) ending 31 March 2007.
CMSMS migration and setup services | Hosting with CMSMS installed and ready to go | PM me for Info
Locked

Return to “[locked] Quality Assurance”