Less critical

SaltOS URL PHPExcel Cross-Site Scripting Vulnerability

-

Release Date:  2012-08-21    Last Update:  2012-08-24    Views:  1,374

Secunia Advisory SA50312

Where:

You need to log in to view this

Impact:

You need to log in to view this

Solution Status:

You need to log in to view this

Software:

You need to log in to view this

CVE Reference(s):

You need to log in to view this

Description


Stefan Schurtz has discovered a vulnerability in SaltOS, which can be exploited by malicious people to conduct cross-site scripting attacks


You need to log in to the Secunia Community to view the full description of this advisory

If you are not a member of the Secunia community, you can sign up here for free.

Do you have additional information related to this advisory?

Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this information to vuln@secunia.com

Subject: SaltOS URL PHPExcel Cross-Site Scripting Vulnerability

User Message
This user no longer exists RE: SaltOS URL PHPExcel Cross-Site Scripting Vulnerability
Member 21st Aug, 2012 14:00
Last edited on 21st Aug, 2012 14:00 Solution Status - Vendor Patch; Solution - No official solution is currently available.. ?! oO
Was this reply relevant?
+0
-0
josepsanzcamp RE: SaltOS URL PHPExcel Cross-Site Scripting Vulnerability
Member 23rd Aug, 2012 01:34
Score: 0
Posts: 1
User Since: 23rd Aug 2012
System Score: N/A
Location: ES
Hi users.

The issue was fixed in the nightly SaltOS-3.1-5694.noarch.tgz (2012-08-14). The bug allows to use an unused php file (code/lib/phpexcel/PHPExcel/Shared/JAMA/docs/downl oad.php) to do the attack. If you want to fix the issue, you only need to remove the entire directory code/lib/phpexcel/PHPExcel/Shared/JAMA/docs (examples and tests directories too is recomended).

Josep Sanz, saltos.net
Was this reply relevant?
+0
-0

-

You must be logged in to post a comment.