Splatt Forum XSS

From: MegaHz (megahzat_private)
Date: Thu Jun 06 2002 - 06:01:29 PDT

  • Next message: secureat_private: "[CLA-2002:494] Conectiva Linux Security Announcement - bind"

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    Vulnerable systems:
     * Splatt Forum 3.0
    
    Immune systems:
     * Splatt Forum 3.1
    
    Splatt forum uses a user provided string (through the [IMG] tag) in
    the following HTML tag: 
    <img src="$user_provided" border="0" />
    
    While there is a check to force the string to begin with "http://" it
    doesn't disallow the symbol: ". This means that a malicious user can
    escape the src="" in the HTML tag and insert his own HTML code. This
    same problem also exists in the remote avatar part of the user
    profile. 
    
    Example:
    Enter the following anywhere in a message: 
    [img]http://a.a/a"onerror="javascript:alert(document.cookie)[/img] 
    
    After that, anyone reading the message should see a popup with his
    cookie.
    
    Severity:
    Malicious users can steal other users' and the administrator's
    cookies. This would allow the attacker to impersonate other users on
    the board and access to the administration panel. 
    
    Solution:
    Upgrade to the latest version of Splatt (version 3.1).
    Download splatt from: www.splatt.it
    
    
    p.s. LIKE the recent PHPBB2 bug, (I just copy and paste from
    securiteam's phpbb advisory)
    
    
    
    /*
     * Andreas Constantinides (MegaHz)
     * www.cyhackportal.com
     * www.megahz.org
     *
    /*
    
    -----BEGIN PGP SIGNATURE-----
    Version: PGPfreeware 7.0.3 for non-commercial use <http://www.pgp.com>
    
    iQA/AwUBPP9dJkJeOgJQULK7EQKFAACfYC3RGv+o4nDYO+fUtqkljjD51MUAnAhE
    XCAhzIEN5B9zN14s54P19N49
    =ERD/
    -----END PGP SIGNATURE-----
    



    This archive was generated by hypermail 2b30 : Thu Jun 06 2002 - 11:03:34 PDT