Securimage 3.5 URI-based Cross-Site Scripting Vulnerability
Title: Securimage 3.5 URI-based Cross-Site Scripting Vulnerability
Advisory ID: ZSL-2013-5139
Type: Local/Remote
Impact: Cross-Site Scripting
Risk: (3/5)
Release Date: 10.05.2013
--------------------------------------------------------------------------------
--------------------------------------------------------------------------------
[23.04.2013] Contact with the vendor.
[23.04.2013] Vendor replies asking more details.
[23.04.2013] Sent detailed information to the vendor.
[24.04.2013] Working with the vendor.
[30.04.2013] Asked vendor for status update.
[09.05.2013] No reply from the vendor.
[10.05.2013] Public security advisory released.
[15.02.2014] Vendor releases version 3.5.1 to address this issue.
[2] http://cxsecurity.com/issue/WLB-2013050082
[3] http://www.securityfocus.com/bid/59796
[4] http://xforce.iss.net/xforce/xfdb/84157
[5] http://osvdb.org/show/osvdb/93439
[6] http://phpcaptcha.org/Securimage_Docs/files/securimage.php.html#source-view
[7] https://github.com/dapphp/securimage/blob/master/securimage.php
[11.05.2013] - Added reference [1], [2] and [3]
[14.05.2013] - Added reference [4]
[17.05.2013] - Added reference [5]
[08.03.2015] - Added vendor status and reference [6]
[26.08.2016] - Added reference [7]
Web: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk
Advisory ID: ZSL-2013-5139
Type: Local/Remote
Impact: Cross-Site Scripting
Risk: (3/5)
Release Date: 10.05.2013
Summary
Securimage is an open-source free PHP CAPTCHA script for generating complex images and CAPTCHA codes to protect forms from spam and abuse.Description
Securimage suffers from a XSS issue in 'example_form.php' that uses the 'REQUEST_URI' variable. The vulnerability is present because there isn't any filtering to the mentioned variable in the affected script. Attackers can exploit this weakness to execute arbitrary HTML and script code in a user's browser session.--------------------------------------------------------------------------------
/example_form.php:
-------------------------
47: <form method="post" action="<?php echo $_SERVER['REQUEST_URI'] . $_SERVER['QUERY_STRING'] ?>" id="contact_form">
--------------------------------------------------------------------------------
Vendor
Securimage PHP CAPTCHA - http://www.phpcaptcha.orgAffected Version
3.5Tested On
Apache, PHP 5.3.6Vendor Status
[21.04.2013] Vulnerability discovered.[23.04.2013] Contact with the vendor.
[23.04.2013] Vendor replies asking more details.
[23.04.2013] Sent detailed information to the vendor.
[24.04.2013] Working with the vendor.
[30.04.2013] Asked vendor for status update.
[09.05.2013] No reply from the vendor.
[10.05.2013] Public security advisory released.
[15.02.2014] Vendor releases version 3.5.1 to address this issue.
PoC
securimage_xss.txtCredits
Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>References
[1] http://packetstormsecurity.com/files/121575[2] http://cxsecurity.com/issue/WLB-2013050082
[3] http://www.securityfocus.com/bid/59796
[4] http://xforce.iss.net/xforce/xfdb/84157
[5] http://osvdb.org/show/osvdb/93439
[6] http://phpcaptcha.org/Securimage_Docs/files/securimage.php.html#source-view
[7] https://github.com/dapphp/securimage/blob/master/securimage.php
Changelog
[10.05.2013] - Initial release[11.05.2013] - Added reference [1], [2] and [3]
[14.05.2013] - Added reference [4]
[17.05.2013] - Added reference [5]
[08.03.2015] - Added vendor status and reference [6]
[26.08.2016] - Added reference [7]
Contact
Zero Science LabWeb: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk