On August 13, 2009, Isfahan University of Technology CERT team disclosed a XSS vulnerability in Elkapax CMS. The advisory did not contain the vulnerable script (only parameter, presumably to "index.php" or default page), did not coordinate with the vendor, did not offer their own solution beyond "sanitize input" in so many words. This amazing feat of "vulnerability research" apparently took three people. This is pathetic and shows their 'CERT' team is staffed by morons.

From: security curmudgeon (jericho[at]attrition.org)
To: faghani@nsec.ir
Cc: bugtraq[at]securityfocus.com
Date: Wed, 19 Aug 2009 05:09:30 +0000 (UTC)
Subject: Re: Elkapax CMS Cross site scripting vulnerability

: Title: Elkapax CMS Multiple Vulnerabilities
:
: Vendor: www.elkapax.com

: Fix: N/A

: Elkapax is a CMS producer in Iran. Search page in Elkapax CMS
:
: product are vulnerable to XSS vulnerability.
:
: Cross Site Scripting vulnerability in  Search page in "q" parameter.
:
: http://example.com/?q=<script>alert(123)</script>&mode=2
:
: Solution:
:
: Input validation of Parameter "q" should be corrected.
:
: Credit:
:
: Isfahan University of Technology - Computer Emergency Response Team
:
: Thanks to : N. Fathi, E. Jafari, M. R. Faghani

So a University of Technology maintains a CERT team, that discloses the
most basic of XSS flaws, and you cannot even figure out which script is
affected?

You thank three people, presumably for help in this discovery or advisory.
On top of that, you disclose this without a solution other than "sanitize
input" in so many words.

I believe you have done worse than any of the random <script> pasting
kiddies flooding the list for the last ten years.

- security curmudgeon



main page ATTRITION feedback