XOOPS MyTextSanitizer CSS 1.3x & 2.x

From: magistrat (magistrat@blocus-zone.com)
Date: Fri Apr 25 2003 - 08:25:29 PDT

  • Next message: Albert Puigsech Galicia: "Multiple SQL injection on OpenBB forums"

    
     ('binary' encoding is not supported, stored as-is)
    Author: Doxical & Magistrat
    http://www.blocus-zone.com
    Date: 25/04/2003
    
    Object: XOOPS MyTextSanitizer Filtering Bug Allows Remote Users to Conduct 
    Cross-Site Scripting Attacks in many modules: News, newbb, private 
    messages, signatures etc...
    Impact: Disclosure of authentication information, Execution of arbitrary 
    code via network, Modification of user information, admin account 
    hijacking.
    Fix: yes
    
    introduction
    
    After glossary and gallery modules of xoops, we have found an another 
    vulnerability in MytextSanitizer function who permit somme CSS injection 
    in xoops versions 1.3.x to 2.x 
    
    Description of the MyTextSanitizer script :
    
    This is just the function on xoops who filters the unauthorized characters 
    or malicious scripts.
    
    The vulnerability :
    
    A remote user can bypass Sanitizer and conduct cross-site scripting 
    attacks with a post in a topic in board (newbb) send malicious private 
    message to admin, insert script in the news comment...
    
    Example : 
    
    java script:alert%28document.cookie%29
    with img tags
    
    History: 
    
    -the team of xoops.org was prevented on 04/21/2003
    -Patch are now available since 04/25/2003
    
    Regards
    



    This archive was generated by hypermail 2b30 : Fri Apr 25 2003 - 09:01:48 PDT