lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Sat, 9 May 2015 01:05:28 +0800
From: Jing Wang <justqdjing@...il.com>
To: fulldisclosure@...lists.org
Subject: [FD] Artnana Webboard version 1.4 XSS (Cross-site Scripting) Web
	Security Vulnerabilities

*Artnana Webboard version 1.4 XSS (Cross-site Scripting) Web Security
Vulnerabilities*


Exploit Title: Artnana Webboard version 1.4 Multiple XSS Security
Vulnerabilities
Product: Webboard
Vendor: Artnana
Vulnerable Versions: version 1.4
Tested Version: version 1.4
Advisory Publication: May 09, 2015
Latest Update: May 09, 2015
Vulnerability Type: Cross-Site Scripting [CWE-79]
CVE Reference: *
Impact CVSS Severity (version 2.0):
CVSS v2 Base Score: 4.3 (MEDIUM) (AV:N/AC:M/Au:N/C:N/I:P/A:N) (legend)
Impact Subscore: 2.9
Exploitability Subscore: 8.6
Writer and Reporter: Jing Wang [School of Physical and Mathematical
Sciences (SPMS), Nanyang Technological University (NTU), Singapore]
(@justqdjing)




*Proposition Details:*


*(1) Vendor & Product Description:*


*Vendor:*
Artnana


*Product & Vulnerable Versions:*
Webboard
version 1.4



*Vendor URL & Download:*
Webboard can be obtained from here,
http://www.artnana.com/web-d.php




*Product Introduction Overview:*
"Webboard is Thailand IT company that provide software service. Webboard
can make your website easier and convenience. WebBoard is a discussion
board where you post messages and participate in discussions with the other
people in the course."




*(2) Vulnerability Details:*
Artnana Webboard web application has a computer security bug problem. It
can be exploited by stored XSS attacks. This may allow a remote attacker to
create a specially crafted request that would execute arbitrary script code
in a user's browser session within the trust relationship between their
browser and the server.

Several other Artnana products 0-day vulnerabilities have been found by
some other bug hunter researchers before. Artnana has patched some of them.
FusionVM Vulnerability Management and Compliance provides sources for the
latest info-sec news, tools, and advisories. It has published suggestions,
advisories, solutions details related to XSS vulnerabilities.


*(2.1) *The first programming code flaw occurs at "&keyword" parameter in
"search_topic.php?" page.


*(2.2) *The second programming code flaw occurs at "&keyword" parameter in
"search_products.php" page.





*References:*
http://www.tetraph.com/security/xss-vulnerability/artnana-webboard-version-1-4-xss/
http://securityrelated.blogspot.com/2015/05/artnana-webboard-version-14-xss-cross.html
https://vulnerabilitypost.wordpress.com/2015/05/08/artnana-webboard-version-1-4-xss/
http://diebiyi.com/articles/%E5%AE%89%E5%85%A8/artnana-webboard-version-1-4-xss/
http://whitehatpost.blog.163.com/blog/static/24223205420154895051990/#
https://progressive-comp.com/?a=139222176300014&r=1&w=1https://www.fusionvm.com/FusionVM/DesktopModules/SecurityAdvisories/SecurityAdvisoriesView.aspx?Alias=www.fusionvm&TabId=0&Lang=en-US&OU=0&ItemId=44831
https://www.bugscan.net/#!/x/21221
http://bluereader.org/article/30765597



--
Jing Wang,
Division of Mathematical Sciences (MAS),
School of Physical and Mathematical Sciences (SPMS),
Nanyang Technological University (NTU),
Singapore.
http://www.tetraph.com/wangjing/
https://twitter.com/justqdjing

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ