---------------------------------------------------------------------- Secunia Network Software Inspector 2.0 (NSI) - Public Beta The Public Beta has ended. Thanks to all that participated. Learn more: http://secunia.com/network_software_inspector_2/ ---------------------------------------------------------------------- TITLE: Nuke ET Security Bypass and Script Insertion Vulnerabilities SECUNIA ADVISORY ID: SA30061 VERIFY ADVISORY: http://secunia.com/advisories/30061/ CRITICAL: Moderately critical IMPACT: Security Bypass, Cross Site Scripting WHERE: >From remote SOFTWARE: Nuke ET 3.x http://secunia.com/product/5075/ DESCRIPTION: mrzayas has reported some vulnerabilities in Nuke ET, which can be exploited by malicious people to bypass certain security restrictions or conduct script insertion attacks. 1) Input passed via the title in a new Journal entry is not properly sanitised before being used. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user's browser session in context of an affected site when a malicious Journal is viewed. 2) It is possible to perform certain actions as a different user within the Journal module by modifying certain cookie data. Successful exploitation requires knowledge of the other user's username and user ID. The vulnerability is reported in version 3.x. Other versions may also be affected. SOLUTION: The vendor recommends editing certain files. http://truzone.org/modules.php?name=Forums&file=viewtopic&p=332746 http://truzone.org/modules.php?name=Forums&file=viewtopic&p=332743 PROVIDED AND/OR DISCOVERED BY: mrzayas ORIGINAL ADVISORY: http://www.mrzayas.es/2008/05/04/multiples-vulnerabilidades-en-nuket-3x/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------