Siehe auch http://xforce.iss.net/xforce/xfdb/22437CMS Made Simple (CMSMS) is a PHP-based Content Management System (CMS) for any operating system. CMS Made Simple version 0.10 is vulnerable to cross-site scripting. A remote attacker could send a specially-crafted URL containing embedded script to the index.php script which, once the link is clicked, would be executed in the victim's Web browser within the security context of the hosting site. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.
Hier noch eine andere Meldung aus dem gleichen Laden:
Und hierCMS Made Simple (CMSMS) is a PHP-based Content Management System (CMS) for any operating system. CMS Made Simple versions 0.10 and earlier could allow an attacker to bypass security. If register_globals is enabled, a remote attacker could exploit a vulnerability in the admin/lang.php script of the CMS_ADMIN_PAGE to bypass security and gain access to the vulnerable system.
von hier: http://www.securitytracker.com/alerts/2 ... 14971.htmlThe script does not properly filter HTML code from user-supplied input in the 'page' parameter before displaying the input. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the CMS Made Simple software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.