Multiple vulnerabilities in ocPortal
Advisory ID: | HTB23078 |
Product: | ocPortal |
Vendor: | ocProducts Ltd |
Vulnerable Versions: | 7.1.5 and probably prior |
Tested Version: | 7.1.5 |
Advisory Publication: | February 29, 2012 [without technical details] |
Vendor Notification: | February 29, 2012 |
Vendor Fix: | March 21, 2012 |
Public Disclosure: | March 28, 2012 |
Latest Update: | March 22, 2012 |
Vulnerability Type: | Cross-Site Scripting [CWE-79] Path Traversal [CWE-22] |
CVE References: | CVE-2012-1470 CVE-2012-1471 |
Risk Level: | Medium |
CVSSv2 Base Scores: | 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N) |
Solution Status: | Fixed by Vendor |
Discovered and Provided: | High-Tech Bridge Security Research Lab |
Advisory Details: | |
High-Tech Bridge SA Security Research Lab has discovered multiple vulnerabilities in ocPortal, which can be exploited to perform Cross-Site Scripting (XSS) and Arbitrary File Disclosure attacks. | |
Solution: | |
Upgrade to 7.1.6 More information: http://ocportal.com/site/news/view/new-releases/ocportal-7-1-6-released.htm http://ocportal.com/site/news/view/ocportal-security-update.htm | |
References: | |
[1] High-Tech Bridge Advisory HTB23078 - https://www.immuniweb.com/advisory/HTB23078 - Multiple vulnerabilities in ocPortal. [2] ocPortal - http://ocportal.com - ocPortal is the versatile (and free) Content Management System (“CMS”) for next generation websites. [3] Common Vulnerabilities and Exposures (CVE) - http://cve.mitre.org/ - international in scope and free for public use, CVE® is a dictionary of publicly known information security vulnerabilities and exposures. [4] Common Weakness Enumeration (CWE) - http://cwe.mitre.org - targeted to developers and security practitioners, CWE is a formal list of software weakness types. | |
HTB22883: Multiple Vulnerabilities in LotusCMS
HTB22870: Multiple Vulnerabilities in GRAND Flash Album Gallery
Please feel free to send us any additional information related to this Advisory, such as vulnerable versions, additional exploitation details and conditions, patches and other relevant details.