what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

phorum345.txt

phorum345.txt
Posted Jan 8, 2004
Authored by Calum Power

Multiple cross site scripting and SQL injection vulnerabilities lie in Phorum versions 3.4.5 and below.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | ce4d046825486555efd93f2110f9b7992cef09964eb5fe0fa25ef24f3a1b770b

phorum345.txt

Change Mirror Download
Phorum 3.4.5 Vulnerabilities

-----------------------------
Credit:
Author: : Calum Power
Version(s) : <= 3.4.5
Vendor : Phorum
Vendor URL : http://phorum.org

Vendor Contacted: Yes
Vendor Fix: Phorum has released Phorum v3.4.6 as a response to this
advisory. Please patch your vulnerable software ASAP.

Vulnerabilitiy:
Type: Cross-Site Scripting, SQL Injection
Severity: Moderately Critical

Summary:
Phorum versions prior to 3.4.6 are vulnerable to cross-site scripting and
SQL injection bugs that could allow for the remote compromise of any
server running the affected software.

Details:
VULN #1:
An XSS vulnerability exists in the script 'common.php' that allows
arbitrary code
execution on the client-side browser.
Ironically, this vulnerability is in the 'phorum_check_xss()' function.
The vulnerable code is below:
if(!is_array($value) && $key!="body" && $key!="subject" &&
$key!="hide" && stristr($value, "<script")){
echo "script detected in $key";
By sending a HTTP/POST variable to any Phorum script, an attacker
could craft the key of the variable into
an XSS attack, providing the value of the variable contains the string
"<script".

*** This vulnerability has been fixed in Phorum 5.0.2alpha. ***

Severity: Medium - This vulnerability may be exploited to obtain user
login details, spam, or perform social-engineering upon the user.

VULN #2:
Another XSS vulnerability exists in the script 'profile.php'. This
vulnerability exists via insufficient
sanitization of the variable 'EditError'. If a user is logged on, an
attacker could use this vulnerability
to include arbitrary code on the user's browser.
NOTE: Phorum (common.php) does checks for '<script>' tags, however XSS
attacks are NOT limited to just the
<script> tags! An attacker could use many forms of XSS (such as
<iframe>) to launch attacks upon users.
*** This vulnerability has been fixed in Phorum 5.0.2alpha. ***

Severity: Medium/Low - This can only be exploited when the user is
logged on, but as such could be used to reset passwords, or change any
other user info without the user knowing.

VULN #3:
Once again, there is an XSS vulnerability in the script 'login.php'
that may allow attackers to execute
arbitrary code in the users' browser (Woah, deja moo...)
This exploit is due to (again) the 'Error' variable not being
sanitized correctly.
I have created Proof-of-Concept code (using an <iframe>) that allows
for the stealing of user passwords as they are
submitted into the form.
*** This vulnerability has been fixed in Phorum 5.0.2alpha. ***

Severity: High/Critical - Due to the nature of the page, sensitive
form values could be harvested by an attacker.

VULN #4:
A SQL Injection vulnerability exists in the script 'register.php' in
the field 'hide_email'.
This vulnerability could lead to the execution of SQL commands inside
the script.
*** This code appears to not exist in Phorum 5.0.2alpha, so is
therefore fixed. ***

Severity: High - Due to the location in which the SQL injection
variable is placed, it is increasingly hard to exploit this
vulnerability to obtain any sort of privilege escalation.

--
Information Security is like decent coffee - When you have it it's
blissful, but it disappears just as you get a taste for it.


---------------------------------------
By: Calum Power [Enune] www.fribble.net
Title: Multiple vulnerabilities in Phorum Forum package
Date: 24-12-2003

Vendor Description:
Phorum is a web based message board written in PHP. Phorum is designed with high-availability and
visitor ease of use in mind. Features such as mailing list integration, easy customization and simple
installation make Phorum a powerful add-in to any website.

Affected versions:
All vulnerabilities listed below were found in version 3.4.5 of Phorum.
However, earlier versions could be (and most likely are) affected by these exploits.

---------------------------------------
Vulnerabilities

VULN #1:
An XSS vulnerability exists in the script 'common.php' that allows arbitrary code
execution on the client-side browser.
Ironically, this vulnerability is in the 'phorum_check_xss()' function.
The vulnerable code is below:
if(!is_array($value) && $key!="body" && $key!="subject" && $key!="hide" && stristr($value, "<script")){
echo "script detected in $key";
By sending a HTTP/POST variable to any Phorum script, an attacker could craft the key of the variable into
an XSS attack, providing the value of the variable contains the string "<script".

*** This vulnerability has been fixed in Phorum 5.0.2alpha. ***

Severity: Medium - This vulnerability may be exploited to obtain user login details, spam, or perform
social-engineering upon the user.

VULN #2:
Another XSS vulnerability exists in the script 'profile.php'. This vulnerability exists via insufficient
sanitization of the variable 'EditError'. If a user is logged on, an attacker could use this vulnerability
to include arbitrary code on the user's browser.
NOTE: Phorum (common.php) does checks for '<script>' tags, however XSS attacks are NOT limited to just the
<script> tags! An attacker could use many forms of XSS (such as <iframe>) to launch attacks upon users.
*** This vulnerability has been fixed in Phorum 5.0.2alpha. ***

Severity: Medium/Low - This can only be exploited when the user is logged on, but as such could be used
to reset passwords, or change any other user info without the user knowing.

VULN #3:
Once again, there is an XSS vulnerability in the script 'login.php' that may allow attackers to execute
arbitrary code in the users' browser (Woah, deja moo...)
This exploit is due to (again) the 'Error' variable not being sanitized correctly.
I have created Proof-of-Concept code (using an <iframe>) that allows for the stealing of user passwords as they are
submitted into the form.
*** This vulnerability has been fixed in Phorum 5.0.2alpha. ***

Severity: High/Critical - Due to the nature of the page, sensitive form values could be harvested by an attacker.

VULN #4:
A SQL Injection vulnerability exists in the script 'register.php' in the field 'hide_email'.
This vulnerability could lead to the execution of SQL commands inside the script.
*** This code appears to not exist in Phorum 5.0.2alpha, so is therefore fixed. ***

Severity: High - Due to the location in which the SQL injection variable is placed, it is increasingly hard
to exploit this vulnerability to obtain any sort of privilege escalation.

Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close