Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAEDdjHemNu_tYxqPN02jEN_yymF-XYV6=qq3A20uAsL92dSY3A@mail.gmail.com>
Date: Fri, 31 Jan 2014 13:25:41 +0000
From: Pedro Ribeiro <pedrib@...il.com>
To: oss-security@...ts.openwall.com
Cc: Steve Kenow <skenow@...resscms.org>, ImpressCMS Security <security@...resscms.org>
Subject: CVE request: impressCMS 1.3.5 arbitrary file deletion and XSS

Hi,

I have discovered two vulnerabilities in ImpressCMS. These have been fixed
in the new 1.3.6 version, which you can get at
https://sourceforge.net/projects/impresscms/files/ImpressCMS%20Official%20Releases/ImpressCMS%201.3%20Branch/ImpressCMS%201.3.6/
.

One is an arbitrary file deletion and the other is two cross site scripting
issues.
Note that I was unable to exploit the XSS issues due to the inbuilt
protection module, so I'm not sure if it qualifies for a CVE.

The tickets containing the information are available here
https://www.assembla.com/spaces/dW4voyNP0r4ldbeJe5cbLr/tickets?report%5Bestimate_show%5D=true&report%5Bid%5D=0&report%5Bmilestone_id_cond%5D=1&report%5Bmilestone_id_val%5D=4129593&report%5Btitle%5D=All+Tickets+for+%27ImpressCMS+1.3.6%27&report%5Btotal_estimate_show%5D=true&report%5Btotal_invested_hours_show%5D=true&report%5Bworking_hours_show%5D=true.


Unfortunately I can't paste the full report in this email as the Android
Gmail client will mangle it. Please see the text file at
https://github.com/pedrib/PoC/blob/master/ImpressCMS/impresscms-1.3.5.txtfor
more details.

Thanks in advance,  and thanks to the ImpressCMS team for being so
responsive.

Regards,
Pedro Ribeiro
Agile Information Security

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.