lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20030810171222.22984.qmail@www.securityfocus.com> Date: 10 Aug 2003 17:12:22 -0000 From: G00db0y <G00db0y@...e-h.org> To: bugtraq@...urityfocus.com Subject: ZH2003-21SA (security advisory): DcForum+ XSS Vulnerability ZH2003-21SA (security advisory): DcForum+ XSS Vulnerability Published: 10 august 2003 Released: 10 august 2003 Name: DcForum+ Affected Systems: 1.2 Issue: Remote attackers can inject XSS script Author: G00db0y@...e-h.org Vendor: http://www.dcscripts.com/dcforump.shtml Description *********** Zone-h Security Team has discovered a flaw in DcForum+ 1.2 (and older versions?). DcForum+ is a very user friendly bulletin board program that utilitzes mySQL server on the backend and PHP on the front end. Details ******* It's possibile to inject XSS script in the subject variable. For example try this: Your Name: Zone-h Security Team Your Email: test@...t.com Your Subject: <script>alert(Zone-h)</script> Your Message: Zone-h.org Solution: ********* The vendor has been contacted and a patch was produced. Suggestions: ************ Filter the subject variable. G00db0y - www.zone-h.org admin Original advisory here: http://www.zone-h.org/en/advisories/read/id=2865/