Total Tests:

Script Insertion Vulnerability in Textpattern CMS

This vulnerability was discovered by our security researchers before 2019.

Advisory ID:HTB22672
Product:Textpattern CMS
Vendor:Team Textpattern
Vulnerable Versions:4.2.0 and probably prior
Tested Version:4.2.0
Advisory Publication:October 21, 2010 [without technical details]
Vendor Notification:October 21, 2010
Public Disclosure:November 4, 2010
Latest Update:October 22, 2010
Vulnerability Type:Cross-Site Scripting [CWE-79]
Risk Level:Medium
Medium Risk
CVSSv2 Base Score:5 (AV:N/AC:L/Au:N/C:N/I:P/A:N)
Solution Status:Fixed by Vendor
Discovered and Provided:High-Tech Bridge Security Research Lab
 

Advisory Details:

High-Tech Bridge SA Security Research Lab has discovered vulnerability in Textpattern CMS which could be exploited to perform script insertion attacks.

1) Script insertion vulnerability in Textpattern CMS
An input sanitation error exists in the comment field. A remote attacker can insert arbitrary HTML and script code, which will be executed in user`s browser in context of the vulnerable website when the user views the malicious data.
Exploitation example:
Add the following comment to the site:
Nice site. !http://123"onerror="javascript:document.location.href='http://htbridge.ch'; "!


Solution:
Upgrade to version 4.3.0.


References:
[1] High-Tech Bridge Advisory HTB22672 - https://www.immuniweb.com/advisory/HTB22672 - Cross-site Scripting (XSS) Vulnerability in Textpattern CMS
[2] Textpattern CMS - textpattern.com - Textpattern CMS is a flexible, elegant and easy-to-use content management system.
[3] Common Weakness Enumeration (CWE) - http://cwe.mitre.org - targeted to developers and security practitioners, CWE is a formal list of software weakness types.

Have additional information to submit?
Please feel free to send us any additional information related to this Advisory, such as vulnerable versions, additional exploitation details and conditions, patches and other relevant details.
Ask a Question