exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

vBulletinBBS.txt

vBulletinBBS.txt
Posted Jan 21, 2004
Authored by Darkwell | Site gcf.de

vBulletin Bulletin Board derivatives contain a security bug that may lead to disclosure of private information via cross site scripting attacks. This vulnerability may also enable an attacker to transmit sensitive information such as encrypted passwords, user identification numbers, or forum passwords to another server.

tags | advisory, xss
SHA-256 | 648da248485971d719402b2948f41a186eff85e43a7ac497adcf75b8977cbf58

vBulletinBBS.txt

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - -------------------------------------------------------
GERMAN COMPUTER FREAKS - SECURITY ADVISORY - SINCE 1997
January 20st, 2003
- - -------------------------------------------------------

Software : vBulletin Bulletin Board
Vendor : Jelsoft Enterprises Limited / inGame GmbH
Vulnerability : Cross Site Scripting
Status : Author has been notified

- - ------------------------------------------------------

- - - - Description

vBulletin Bulletin Board derivatives contain a security bug
that may lead to disclosure of private informations due to a
cross site scripting attack.

This vulnerability may enable an attacker to transmit sensitive
informations like 'encrypted' passwords, user identification
numbers or forum passwords to another server.

Currently, we will refrain from publishing proof of concept
information to mitigate the impact of this vulnerability.

- - - - Technical Details

Due to an improper quoted field in register.php it's possible
to inject malicious HTML code. With the use of Javascript code
an attack is then able to send sensitive informations (like
cookies) to a foreign server.

Attack Example:

<form action="http://www.VULN-BOARD.com/register.php" method="GET">
<input type="hidden" name="reg_site"
value="<SCRIPT><!-- EVIL CODE //--></SCRIPT>"/>
<input type="text" name="email" value="" />
<input type="submit" value="Show my cookies" />

- - - - Patch

The vendor released a patch for this vulnerability.

- - - - Closing Words

07.01.04 Contacting the board developers and explaining the vulnerability
08.01.04 Developing a proof of concept tool (undisclosed)
20.01.04 Disclosure of this advisory to public

- - - - Greets

This bug was found by Darkwell. We would like to great Natok!
He's great!

_________________ ___________
/ _____/\_ ___ \\_ _____/
/ \ ___/ \ \/ | __)
\ \_\ \ \____| \
\______ /\______ /\___ /
\/ \/ \/
The German Computer Freaks
www.gcf.de Since 1997 /\
/ \
____________________________________________________________/ # /
\ /
\/

-----BEGIN PGP SIGNATURE-----
Note: This signature can be verified at https://www.hushtools.com/verify
Version: Hush 2.3

wkYEARECAAYFAkANbpsACgkQcd4BvfErJcpzFQCggXQa7WHVZslM1e/3ahG333e8lrMA
oL1vBo7v3oJjMNxhzf3oINBIp8e6
=msHO
-----END PGP SIGNATURE-----




Concerned about your privacy? Follow this link to get
FREE encrypted email: https://www.hushmail.com/?l=2

Free, ultra-private instant messaging with Hush Messenger
https://www.hushmail.com/services.php?subloc=messenger&l=434

Promote security and make money with the Hushmail Affiliate Program:
https://www.hushmail.com/about.php?subloc=affiliate&l=427
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close