exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

sbb-xss.txt

sbb-xss.txt
Posted May 15, 2007
Authored by Jesper Jurcenoks | Site netvigilance.com

SonicBB version 1.0 suffers from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
advisories | CVE-2007-1903
SHA-256 | 89536131142d22ebd0721e958f80cf261f62023d19c2d6999a6346c95e57e740

sbb-xss.txt

Change Mirror Download
  netVigilance Security Advisory #20

SonicBB version 1.0 XSS Attack Vulnerabilities

Description:
SonicBB is a user-friendly and fully customizable bulletin board package. SonicBB is compatible with any web server/operating system combo with PHP 4.x or higher installed.SonicBB is the ideal community software for all sites.

This vulnerabilities can be exploited only when PHP magic_quotes_gpc = Off.

External References:
Mitre CVE: CVE-2007-1903
NVD NIST: CVE-2007-1903
OSVDB: 34042

Summary:
SonicBB is a user-friendly and fully customizable bulletin board package. SonicBB is compatible with any web server/operating system combo with PHP 4.x or higher installed. SonicBB is the ideal community software for all sites.
Security problem in the product allows attackers to commit XSS attacks.

Advisory URL:
http://www.netvigilance.com/advisory0020

Release Date:
05/14/2007

Severity:
Risk: Medium

CVSS Metrics
Access Vector: Remote
Access Complexity: High
Authentication: Not-required
Confidentiality Impact: Partial
Integrity Impact: Partial
Availability Impact: Partial
Impact Bias: Normal
CVSS Base Score: 5.6

Target Distribution on Internet: Low

Exploitability: Functional Exploit
Remediation Level: Workaround
Report Confidence: Confirmed

Vulnerability Impact: Attack
Host Impact: XSS Attack.

SecureScout Testcase ID:
TC 17944
Vulnerable Systems:
SonicBB version 1.0

Vulnerability Type:
XSS (Cross-Site Scripting) to force a web-site to display malicious contents to the target, by sending a specially crafted request to the web-site. The vulnerable web-site is not the target of attack but is used as a tool for the hacker in the attack of the victim.

Vendor:
iScripts
Vendor Status:
Contact with the Vendor was established and draft of the security advisory was provided on 10 April 2007, the vendor promised to fix the issue but stopped responding to our emails on 10 April 2007. There is no official fix at the release of this Security Advisory
Workaround:
Modify in the php.ini file following line: magic_quotes_gpc = Off.
Example:
REQUEST:
http://[TARGET]/[PRODUCT-DIRECTORY]/search.php?query=1&part=post`<> '' UNION SELECT `id`,'<script>alert(document.cookie)</script>',1,1,1,1,`username` FROM `users` WHERE id=1%23
REPLY:
Will execute <script>alert(document.cookie)</script>
Credits:
Jesper Jurcenoks
Co-founder netVigilance, Inc
www.netvigilance.com


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close