RE: CSS in ikonboard 3.0.1,3.0.2,3.0.3

From: Michael Ginese (MGineseat_private)
Date: Thu Mar 21 2002 - 08:35:52 PST

  • Next message: Richard M. Smith: "How Outlook 2002 can still execute JavaScript in an HTML email message"

    If you have 
    
    Allow dynamic pages in IMG tags? set to "no"
    
    under "Board Options" --> "Basic Security Settings"
    
    is this still a threat?
    
    Mike
    
    -----Original Message-----
    From: Max Speed [mailto:maxspeed017at_private]
    Sent: Wednesday, March 20, 2002 12:14 AM
    To: bugtraqat_private
    Subject: CSS in ikonboard 3.0.1,3.0.2,3.0.3
    
    
    
    
    author: Maxspeed
    vendor statues: they have been informed
    
    Vulnerable versions: ikonboard 3.0.1
                                   ikonboard 3.0.2
                                   ikonboard 3.0.3(the version they 
    use on their site)
    
    Severity: Malicious users can steal session cookies, 
    allowing administrative access to the admin panel
    
    Problem:
    Ok the problem is in the way the [img] tags check for 
    the "http://". The [img] tags checks for the "http://" 
    when you posting a new topic but it doesnt check for 
    it while your editing one. So it will allow you to insert 
    malacious code while you editing a post.
    
    Proof of concept:
    
    Make a new post, then "EDIT" the post and in the 
    body of the post insert this code
    
    [IMG]javascript:alert(document.cookie)[/IMG]
    
    an alert box should pop up displaying your cookies!
    
    Fix: 
    
    make [IMG] tags check for "http://" when editing a 
    post.
    
    Maxspeed017at_private
    



    This archive was generated by hypermail 2b30 : Thu Mar 21 2002 - 17:10:44 PST