PDA

Bekijk Volledige Versie : Software PBLang 4.65 pm.php XSS vulnerability



Raven
23/02/05, 17:55
[][][][][][][][][][][][][][][][][][][][][][][][][][]
[][][]
[]
[] HRG - Hackerlounge Research Group
[] Release: HRG003
[] Friday 11-02-05
[] Software PBLang 4.65 pm.php XSS vulnerability
[]
[] The author can't be held responsible for any
damage
[] done by a reader. You have your own resonsibility
[] Please use this document like it's meant to.
[]
[][][][][][][][][][][][][][][][][][][][][][][][][][]
[][][]

Vulnerable: PBLang 4.65 (current) (and earlier?)


---

General information:

PBLang is an international BBS-software based on
PHP. It does not require any database but bases on a
flatfile system. Many professional features. More
info on the project website.


---

Description:

When a user receives a PM with a HTML in the
subject, it will be executed as soon as the user
opens his pm.php. This may give an attacker the
opportunity for a session steal. The link for the PM
will not be linked, so viewing the contents of the
message gets harder. An attacker could also flood a
users PM box by sending messages with a title like
<script>
and the PM will not appear in the receivers window,
while it will say he/she has got a new PM.

---

Proof Of Concept:

Type in the subject box "<script
language="javascript">alert("Hackerlounge.com pwns
joo");</script>" and submit. An alertbox with the
text "Hackerlounge.com pwns joo" should come up when
a user visits pm.php.


---

Fix and Vendor status:

Vendor has been notified, expect an official patch
soon.


---

Credit:

HRG - Hackerlounge Research Group
Hackerlounge.com

[][][][][][][][][][][][][][][][][][][][][][][][][][]
[][][]
[]
[] HRG - Hackerlounge Research Group
[] Release: HRG003
[] Friday 11-02-05
[] Software PBLang 4.65 pm.php XSS vulnerability
[]
[] The author can't be held responsible for any
damage
[] done by a reader. You have your own resonsibility
[] Please use this document like it's meant to.
[]
[][][][][][][][][][][][][][][][][][][][][][][][][][]
[][][]