SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Forum/Board/Portal)  >   UBBThreads Vendors:   Infopop
UBBThreads Input Validation Hole in 'Cat' Parameter Lets Remote Users Conduct Cross-Site Scripting Attacks
SecurityTracker Alert ID:  1012503
SecurityTracker URL:  http://securitytracker.com/id/1012503
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Dec 14 2004
Impact:   Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information
Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): 6.2.3, 6.5
Description:   Some input validation vulnerabilities were reported in UBBThreads. A remote user can conduct cross-site scripting attacks.

g@cat reported that several scripts do not properly validate user-supplied input in the 'Cat' parameter. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the UBBThreads software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

Some demonstration exploit URLs are provided:

[forum]/showflat.php?Cat=document.write(unescape("%3CSCRIPT%3Ealert%28document.domain%29%3B%3C/SCRIPT%3E%3CSCRIPT%3Ealert%28document.cookie%29%3B%3C/SC

[forum]/calendar.php?Cat=document.write(unescape("%3CSCRIPT%3Ealert%28document.domain%29%3B%3C/SCRIPT%3E%3CSCRIPT%3Ealert%28document.cookie%29%3B%3C/SC

[forum]/login.php?Cat=[XSS(s.a.)]

[forum]/online.php?Cat=[XSS(s.a.)]

Other modules are also affected.

The vendor was notified on December 6, 2004.

Impact:   A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the UBBThreads software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.
Solution:   No solution was available at the time of this entry. The vendor plans to include fixes in version 6.5.1.
Vendor URL:  www.ubbcentral.com/ubbthreads/ (Links to External Site)
Cause:   Input validation error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   None.


 Source Message Contents

Subject:  [Full-Disclosure] Multiple XSS Vulnerabilities in several


Vendor: Infopop
URL: http://www.infopop.com/
tested Versions: 6.2.3 & 6.5
remote: yes
vendor notified: 06 Dec 2004 at 01:08 AM
Vendor response: 06/07 Dec 2004 01:33 AM/06:08 PM
Update status: ..in process


============================================================



Summary:
~~~~~~~
UBBThreads is a High end forum system, powered under
PHP and MySQL with many attitude.
A security vulnerability in both (6.2.3 & 6.5) products
allow malicious users to steal session cookies, but
probably more versions are vulnerable.
============================================================



Examples in Version 6.2.3:
~~~~~~~~~~~~~~~~~~~~~~~~~~

[forum]/showflat.php?Cat=document.write(unescape("%3CSCRIPT%3Ealert%28document.domain%29%3B%3C/SCRIPT%3E%3CSCRIPT%3Ealert%28document.cookie%29%3B%3C/SCRIPT%3E%0D%0A"));

tested modules are:
main, search, newuser, login, online, faq, ect..


Note:
~~~~
some of these were fixed in Version 6.5.
It follows the not fixed..
============================================================



Examples in version 6.5:
~~~~~~~~~~~~~~~~~~~~~~~~

[forum]/calendar.php?Cat=document.write(unescape("%3CSCRIPT%3Ealert%28document.domain%29%3B%3C/SCRIPT%3E%3CSCRIPT%3Ealert%28document.cookie%29%3B%3C/SCRIPT%3E%0D%0A"));


[forum]/login.php?Cat=[XSS(s.a.)]

and:
[forum]/online.php?Cat=[XSS(s.a.)]



============================================================



Vendor:
~~~~~
Vulnerabilities will be fixed in the next release,
Version 6.5.1. Since March 2004, Infopop offers no longer
support for any version of UBB.classic or UBB.threads
prior to Version 6.0.

http://www.infopop.com/
http://www.ubbcentral.com/



============================================================

Credits:
~~~~~
dw.; ms.; ect.


-- 
kind regards
g@cat <-> MM


-----------------------------------------
This email was sent using FREE Catholic Online Webmail!
http://webmail.catholic.org/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC