[MajorSecurity #23] BLOG:CMS <= 4.0.0j - XSS and cookie disclosure ------------------------------------------------------------------- Software: BLOG:CMS Version: 4.0.0j Type: Cross site scripting Made public: July, 22th 2006 Vendor: F-ART AGENCY, Ltd. - Radek Hulán Page: http://blogcms.com/ Credits: ---------------------------------------------- Discovered by: David Vieira-Kurz http://www.majorsecurity.de Original Advisory: ---------------------------------------------- http://www.majorsecurity.de/advisory/major_rls23.txt Affected Products: ---------------------------------------------- BLOG:CMS 4.0.0j and prior Description: ---------------------------------------------- BLOG:CMS is the most complete, feature-packed, personal publishing system on the market, developed by Radek Hulán. It includes state-of-the-art weblog, forum, wiki engine, news aggregator (atom /rss), and photo gallery. Requirements: ---------------------------------------------- register_globals = On Vulnerability: ---------------------------------------------- Input passed directly to the "id" parameter is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. It works with a script code like this: >'>