|lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC
Open Source and information security mailing list archives
Date: 29 Jan 2007 05:08:37 -0000 From: DoZ@...kersCenter.com To: bugtraq@...urityfocus.com Subject: Phorum HTML Injection Vulnerability Phorum HTML Injection Vulnerability Phorum is a web based message board written in PHP. Phorum is designed with high-availability and visitor ease of use in mind. Features such as mailing list integration, easy customization and simple installation make Phorum a powerful add-in to any website. Phorum is prone to a cross-site scripting vulnerability. The issue is in the module register.php An attacker may leverage this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks. Hackers Center Security Group (http://www.hackerscenter.com) Credit: Doz Risk: Medium vendor: http://www.phorum.org/ Class: Cross-Site Scripting Remote: Yes Local: Yes Version: 5.1.18 Exploit: An attacker can exploit these issues via a web client. Solution: Filtering out Script characters and limiting fewer characters for Username.
Powered by blists - more mailing lists