Home page logo
/

bugtraq logo Bugtraq mailing list archives

Splatt Forum XSS
From: "MegaHz" <megahz () megahz org>
Date: Thu, 6 Jun 2002 16:01:29 +0300

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Vulnerable systems:
 * Splatt Forum 3.0

Immune systems:
 * Splatt Forum 3.1

Splatt forum uses a user provided string (through the [IMG] tag) in
the following HTML tag: 
<img src="$user_provided" border="0" />

While there is a check to force the string to begin with "http://"; it
doesn't disallow the symbol: ". This means that a malicious user can
escape the src="" in the HTML tag and insert his own HTML code. This
same problem also exists in the remote avatar part of the user
profile. 

Example:
Enter the following anywhere in a message: 
[img]http://a.a/a"onerror="javascript:alert(document.cookie)[/img] 

After that, anyone reading the message should see a popup with his
cookie.

Severity:
Malicious users can steal other users' and the administrator's
cookies. This would allow the attacker to impersonate other users on
the board and access to the administration panel. 

Solution:
Upgrade to the latest version of Splatt (version 3.1).
Download splatt from: www.splatt.it


p.s. LIKE the recent PHPBB2 bug, (I just copy and paste from
securiteam's phpbb advisory)



/*
 * Andreas Constantinides (MegaHz)
 * www.cyhackportal.com
 * www.megahz.org
 *
/*

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 7.0.3 for non-commercial use <http://www.pgp.com>

iQA/AwUBPP9dJkJeOgJQULK7EQKFAACfYC3RGv+o4nDYO+fUtqkljjD51MUAnAhE
XCAhzIEN5B9zN14s54P19N49
=ERD/
-----END PGP SIGNATURE-----



  By Date           By Thread  

Current thread:
  • Splatt Forum XSS MegaHz (Jun 06)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault