Ivan Marković
Security consultant and researcher
Long experience in designing and implementation of security solutions, mainly oriented on web, mobile and embedded applications. Author of penetration testing tools, recognized by OWASP organization and BackTrack Linux distribution. Researching work includes discovery of vulnerabilities of numeral applications and services, and for these, author received public apreciations by Microsoft Company..
Exponent CMS Multiple Vulnerabilities
----------------------------------------------------------------------
Do you have VARM strategy implemented?
(Vulnerability Assessment Remediation Management)
If not, then implement it through the most reliable vulnerability
intelligence source on the market.
Implement it through Secunia.
For more information visit:
http://secunia.com/advisories/business_solutions/
Alternatively request a call from a Secunia representative today to
discuss how we can help you with our capabilities contact us at:
sales@secunia.com
----------------------------------------------------------------------
TITLE:
Exponent CMS Contact Module "email" Cross-Site Scripting
Vulnerability
SECUNIA ADVISORY ID:
SA36703
VERIFY ADVISORY:
http://secunia.com/advisories/36703/
DESCRIPTION:
Ivan Markovic has discovered a vulnerability in Exponent CMS, which
can be exploited by malicious people to conduct cross-site scripting
attacks.
Input passed to the "email" parameter when submitting a message via
the Contact module is not properly sanitised before being returned to
the user. This can be exploited to execute arbitrary HTML and script
code in a user's browser session in context of an affected site.
The vulnerability is confirmed in version 0.97-GA20090213. Other
versions may also be affected.
SOLUTION:
Edit the source code to ensure that input is properly sanitised.
PROVIDED AND/OR DISCOVERED BY:
Ivan Markovic, security-net.biz
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
https://packetstormsecurity.com/files/81847/Secunia-Security-Advisory-36703.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5002