[SCSA-007] Cross Site Scripting Vulnerabilities in WWWBoard

From: Grégory (gregory.lebras@security-corp.org)
Date: Sat Feb 22 2003 - 18:19:21 PST

  • Next message: Grégory: "[SCSA-006] XSS & Function Execution Vulnerabilities in Nuked-Klan"

    
     ('binary' encoding is not supported, stored as-is)
    ________________________________________________________________________
    
    Security Corporation Security Advisory [SCSA-007]
    ________________________________________________________________________
    
    PROGRAM: WWWBoard
    HOMEPAGE: http://www.scriptarchive.com
    VULNERABLE VERSIONS: 2.0A2.1 and prior
    ________________________________________________________________________ 
    
    
    DESCRIPTION
    ________________________________________________________________________
    
    WWWBoard is "A threaded discussion forum that allows users to post 
    new messages, followup to existing ones and more. Includes a basic 
    admin to maintain the board."
    
    (direct quote from WWWBoard website)
    
    
    DETAILS
    ________________________________________________________________________
    
    A Cross-Site Scripting vulnerability have been found in WWWBoard
    which allow attackers to inject script codes into the forum and use them 
    on clients browser as if they were provided by the site.
    
    This Cross-Site Scripting vulnerability are found in the page for 
    posting messages.
    
    An attacker can input specially crafted links and/or other 
    malicious scripts.
    
    
    EXPLOIT
    ________________________________________________________________________
    
    A vulnerability was discovered in the page for posting messages, 
    at this adress : 
    
    http://[target]/wwwboard/wwwboard.html#post
    
    
    The vulnerability is at the level of the interpretation of the "Message" 
    field. 
    
    Indeed, the insertion of a hostile code script in this field makes it 
    possible to a malicious user to carry out this script on the navigator 
    of the visitors.
    
    
    The hostile code could be :
    
    [script]alert("Cookie="+document.cookie)[/script] 
    
    (open a window with the cookie of the visitor.)
    
    (replace [] by <>)
    
    
    SOLUTIONS
    ________________________________________________________________________
    
    No solution for the moment.
    
    
    VENDOR STATUS 
    ________________________________________________________________________
    
    The vendor has reportedly been notified.
    
    
    LINKS
    ________________________________________________________________________
    
    http://www.security-corp.org/index.php?ink=4-15-1
    
    Version Française : 
    
    http://www.security-corp.org/advisories/SCSA-007-FR.txt
    
    
    ------------------------------------------------------------
    Grégory Le Bras aka GaLiaRePt | http://www.Security-Corp.org
    ------------------------------------------------------------
    



    This archive was generated by hypermail 2b30 : Sun Feb 23 2003 - 09:28:45 PST