Latest from our blog
Cross-Site Scripting (XSS) in CMSimple
|Vendor:||Preben Bjorn Biermann Madsen|
|Vulnerable Versions:||3.54 and probably prior|
|Advisory Publication:||February 26, 2014 [without technical details]|
|Vendor Notification:||February 26, 2014|
|Vendor Fix:||February 26, 2014|
|Public Disclosure:||March 19, 2014|
|Vulnerability Type:||Cross-Site Scripting [CWE-79]|
|CVSSv2 Base Score:||4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)|
|Solution Status:||Fixed by Vendor|
|Discovered and Provided:||High-Tech Bridge Security Research Lab|
High-Tech Bridge Security Research Lab discovered vulnerability in CMSimple, which can be exploited to perform Cross-Site Scripting (XSS) attacks.
|Fixed by vendor on February 26, 2014 directly in the source code without version modification/new release. Update to the version 3.54 released after February 26, 2014.|
| High-Tech Bridge Advisory HTB23205 - https://www.htbridge.com/advisory/HTB23205 - Cross-Site Scripting (XSS) in CMSimple.|
 CMSimple - http://cmsimple.p2pnation.eu/ - CMSimple is a content management system primarily designed for easy creation and maintenance of small commercial sites, or sites for associations and individuals.
 Common Vulnerabilities and Exposures (CVE) - http://cve.mitre.org/ - international in scope and free for public use, CVE® is a dictionary of publicly known information security vulnerabilities and exposures.
 Common Weakness Enumeration (CWE) - http://cwe.mitre.org - targeted to developers and security practitioners, CWE is a formal list of software weakness types.
 ImmuniWeb® SaaS - hybrid of manual web application penetration test and cutting-edge vulnerability scanner available online via a Software-as-a-Service (SaaS) model.
Please feel free to send us any additional information related to this Advisory, such as vulnerable versions, additional exploitation details and conditions, patches and other relevant details.