Home page logo

fulldisclosure logo Full Disclosure mailing list archives

Fw: Multiple Vulnerabilities in Cloisterblog web blog/journal (fwd)
From: "Tadghe Danu" <tadghe () mail ru>
Date: Mon, 29 Mar 2004 18:52:41 +0400

For some reason my normal account is having time-outs sending to the list, so I apologize if this gets sent twice.

Executive Overview
Cloisterblog, a general usage web blog written in perl suffers
from multiple XSS and directory transversal issues as well as a design flaw in
the admin section.

Program Description
"CloisterBlog is simple but feature packed Web-based journal system that does
require MySQL or manual modification of files"

Cloisterblog doesn't do any parameter checking on inputs, this leads to
the multiple XSS and directory transversal issues.  In addition, the admin
section of the blog never actually checks the  user id of the user, only
the password.  In addition, no sort of logging  is performed on this
parameter, so it is readable suspectable to brute forcing.


from journal_admin.pl

sub validateUser {

$password = $passfile[0];

  if ($pass eq $password) {
    return 1;
  } else {
    return 0;

($user which is declared in journal_admin.pl is never used)

None, delete the blog and either write your own or choose another

Vendor status
Non Responsive, despite waiting nearly twice as long as we normally do for
at least a "screw you" reply, the authors have not replied, nor released
an updated version. we waitied this long because it appears the author
runs the software him/her self.

Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

  By Date           By Thread  

Current thread:
  • Fw: Multiple Vulnerabilities in Cloisterblog web blog/journal (fwd) Tadghe Danu (Mar 29)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]