The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

computer vulnerability note 12149

Dotclear, TYPO3, SPIP: Cross Site Scripting in the embedded application swfupload.swf

Synthesis of the vulnerability

In a web site managed with Dotclear, TYPO3 or SPIP, an attacker can use swfupload.swf to trigger a Cross Site Scripting, in order to execute JavaScript code within the Web site context.
Impacted products: Dotclear, SPIP, TYPO3 Extensions.
Severity: 2/4.
Creation date: 14/11/2012.
Revision date: 26/11/2012.
Identifiers: BID-56500, VIGILANCE-VUL-12149.

Description of the vulnerability

The blog manager Dotclear and several applications that runs over TYPO3 or SPIP include the Flash application swfupload.swf, to upload files to the server.

The form parameter movieName is used to identify an application instance in the HTML page. However, the application does not check the parameter value before displaying it in the HTML page. An attacker can thus insert JavaScript code in this parameter, which is executed in the victim's Web browser.

In a web site managed with Dotclear, Typo3 or SPIP, an attacker can therefore use swfupload.swf to trigger a Cross Site Scripting, in order to execute JavaScript code within the Web site context.
Complete Vigil@nce bulletin.... (free trial)

Computer vulnerabilities tracking service

Vigil@nce provides networks vulnerabilities analysis. Each administrator can customize the list of products for which he wants to receive vulnerability alerts. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system.