On August 13, 2009, Isfahan University of Technology CERT team disclosed a XSS vulnerability in Elkapax CMS. The advisory did not contain the vulnerable script (only parameter, presumably to "index.php" or default page), did not coordinate with the vendor, did not offer their own solution beyond "sanitize input" in so many words. This amazing feat of "vulnerability research" apparently took three people. This is pathetic and shows their 'CERT' team is staffed by morons.
From: security curmudgeon (jericho[at]attrition.org) To: firstname.lastname@example.org Cc: bugtraq[at]securityfocus.com Date: Wed, 19 Aug 2009 05:09:30 +0000 (UTC) Subject: Re: Elkapax CMS Cross site scripting vulnerability : Title: Elkapax CMS Multiple Vulnerabilities : : Vendor: www.elkapax.com : Fix: N/A : Elkapax is a CMS producer in Iran. Search page in Elkapax CMS : : product are vulnerable to XSS vulnerability. : : Cross Site Scripting vulnerability in Search page in "q" parameter. : : http://example.com/?q=<script>alert(123)</script>&mode=2 : : Solution: : : Input validation of Parameter "q" should be corrected. : : Credit: : : Isfahan University of Technology - Computer Emergency Response Team : : Thanks to : N. Fathi, E. Jafari, M. R. Faghani So a University of Technology maintains a CERT team, that discloses the most basic of XSS flaws, and you cannot even figure out which script is affected? You thank three people, presumably for help in this discovery or advisory. On top of that, you disclose this without a solution other than "sanitize input" in so many words. I believe you have done worse than any of the random <script> pasting kiddies flooding the list for the last ten years. - security curmudgeon