exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

mvnforum-jsxss.txt

mvnforum-jsxss.txt
Posted May 6, 2008
Authored by Christian Holler | Site users.own-hero.net

mvnForum version 1.1 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | dcb8679078bf72bcb063361f8dc3c9099139fcbc28d0ad926e33563c0da074be

mvnforum-jsxss.txt

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

mvnForum Cross Site Scripting Vulnerability

Original release date: 2008-04-27
Last revised: 2008-05-06
Latest version: http://users.own-hero.net/~decoder/advisories/mvnforum-jsxss.txt
Source: Christian Holler <http://users.own-hero.net/~decoder/>


Systems Affected:

mvnForum 1.1 (http://www.mvnforum.com/) - A Java J2EE/Jsp/Servlet forum

Severity: Moderate


Overview:

An attacker who has the rights to start a new thread or to reply
to an existing one, is able to include javascript code using the topic,
that is executed when other users use the quick reply button shown
for every post.

This point of injection is possible because the topic text is part
of an "onclick" event used for the quick reply function and the
software only escapes characters that are typical for HTML cross
site script attacks. In this case, the single quote character is not
escaped.

I. Description

The list of standard functions for threads includes a typical feature
called "quick reply". For user convenience, each post has a button that
jumps to the form field allowing to send a quick reply, whilst changing
the topic text of the reply at the top of this form. This is accomplished
using javascript and the topic that is replied to. The source code for
this button looks like this:

<a href="#message" onclick="QuickReply('24','Re: Some thread topic');">
<img src="/forum/mvnplugin/mvnforum/images/icon/button_quick_reply.gif"
border="0" alt="Quick reply to this post" title="Quick reply to this post" /></a>

Because single quotes are not escaped in the topic context, it is possible
to break out of the second argument and execute arbitrary javascript code
in the client's browser.

II. Impact

Any user that is allowed to post anywhere can use this flaw to steal
sensitive information such as cookies from other users. Especially
because the forum uses simple reusable MD5 hashes in their cookies,
this attack makes it possible to gain unauthorized access to other
user accounts.

However, this attack relies on the user to click the quick reply
button and should therefore be considered only a moderate risk.

III. Proof of concept

Creating a new thread or replying to a thread with the following subject
will demonstrate the problem after hitting the "quick reply" button above
the post text.

Test', alert('XSS ALERT') , '


IV. Solution

At the time of writing, a fix is available in CVS.
http://mvnforum.cvs.sourceforge.net/mvnforum/mvnforum/srcweb/mvnplugin/mvnforum/user/viewthread.jsp?r1=1.316&r2=1.317

Timeline:

2008-04-27: mvnForum authors informed
2008-05-01: Fix available in CVS
2008-05-06: Vulnerability notice published

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.6 (GNU/Linux)

iD8DBQFIIMEXJQIKXnJyDxURAlOPAJ96XH9zfjLJ1jMjCCpheurxwJuqMACfbz2S
FWggJDc19FDPXiiyS+AP9iU=
=Tixo
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close