← Advisories

Limny 3.0.1 (login.php) Remote URI Based Cross-Site Scripting Vulnerability

Medium
Advisory ID
ZSL-2012-5066
Release Date
04 January 2012
Vendor
Hamidreza Samak - http://www.limny.org
Affected Version
3.0.1
Tested On
Microsoft Windows XP Professional SP3 (EN), Apache 2.2.21, MySQL 5.5.16, PHP 5.3.8
Summary

Limny is a free and open-source content management framework with a focus on ease to use and develop. It can be used as a stable and powerful core for heavy and light web applications by having main features of web applications such as user management, multilingual system and multiple theme support. Also its rich graphic library helps designers to create colorable themes instead of designing multiple themes.

Description

Limny suffers from a XSS issue in '/admin/login.php' that uses the 'PHP_SELF' variable. The vulnerability is present because there isn't any filtering to the mentioned variable in the affected script. Attackers can exploit this weakness to execute arbitrary HTML and script code in a user's browser session.

/admin/login.php ---------------- 100: <form name="limny_login" action="<?php print $_SERVER['PHP_SELF']; ?>" method="post">
Proof of Concept
Disclosure Timeline
04.01.2012Vendor has some knowledge about the issue.
06.01.2012Vendor releases version 3.0.2 to address this issue.
Credits
Vulnerability discovered by Gjoko Krstic
References
Changelog
04.01.2012Initial release
05.01.2012Added reference [1], [2], [3] and [4]
06.01.2012Added vendor status and reference [5] and [6]
24.11.2012Added reference [7]
29.11.2012Added reference [8] and [9]