Snitz Forums 2000 Input Validation Flaw in 'register.asp' Lets Remote Users Conduct Cross-Site Scripting Attacks
SecurityTracker Alert ID: 1010524|
SecurityTracker URL: http://securitytracker.com/id/1010524
(Links to External Site)
Date: Jun 18 2004
Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information|
Fix Available: Yes Vendor Confirmed: Yes Exploit Included: Yes |
Version(s): 3.4.04 and possibly prior versions|
An input validation vulnerability was reported in Snitz Forums 2000. A remote user can conduct cross-site scripting attacks.|
Pete Foster of Sec-Tec reported that 'register.asp' script does not properly filter the e-mail address field to remove HTML code.
A remote user can submit a specially crafted e-mail address value during registration. Then, when a target user attempts to click on a link to send e-mail to the newly registered user, arbitrary scripting code will be executed by the target user's browser. The code will originate from the site running the Snitz Forums software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.
A demonstration exploit value is provided:
The vendor was reportedly notified on May 6, 2004.
The original advisory is available at:
A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the Snitz Forums software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.|
The vendor has provided a fix, described at:|
Vendor URL: forum.snitz.com/forum/topic.asp?TOPIC_ID=53360 (Links to External Site)
Input validation error|
|Underlying OS: Linux (Any), UNIX (Any), Windows (Any)|
Source Message Contents
Subject: XSS in Snitz Forum 2000|
Sec-Tec Advisory - XSS in Snitz Forums 2000
The most up to date version of this advisory can always be found at:
Advisory creation date: 6th May 2004
Product: Snitz Forums 2000
Tested version: 3.4.04 (older versions believed to be affected also)
Discoverd by: Pete Foster - Sec-Tec Ltd (www.sec-tec.co.uk)
Snitz Forums 2000 is an interactive discussion environment that allows
different people on the Internet or an Intranet to leave messages for each
other, and then reply.
When registering a new account the register.asp script fails to properly
sanitize the E-mail address (Email) field. An attacker can enter specially
crafted strings into this field that can allow him to launch cross-site
scripting (XSS) attacks. Successful exploitation of this could lead to the
theft of sensitive information, such as valid session details.
When registering a new account (or ammending an existing one), enter the
following as an email address:
When a user then follows a link to send the attacker an email, the script
code is executed.
The Email field should be filtered to remove dangerous characters.
The vendor has given details that fixes the symptoms.
--- Vendor quote ---
On line #184 of pop_mail.asp:
Change this: rs("M_EMAIL")
To this: chkString(rs("M_EMAIL"),"display")
--- End vendor quote ---
Vendor fix details can also be found at:
Vulnerability discovered: April 29th 2004
Vendor notified: May 6th 2004
Vendor response: June 11th 2004
Public release: June 16th 2004
If using this document, please link to:
The contents of this e-mail are confidential and are intended solely for
the use of the person to whom they are addressed. If you are not the
intended recipient of this message please notify the sender and delete it
immediately, disclosure of its content to any other person is prohibited
and may be unlawful. Sec-Tec does not accept any responsibility for
viruses and it is your responsibility to scan the e-mail and attachments.
Any liability arising from any third party acting on information contained
in this e-mail is hereby excluded.