lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <006b01c2c4d7$8811dd00$0300a8c0@goliath>
From: gregory.lebras at security-corp.org (Grégory Le Bras | Security Corporation)
Subject: [SCSA-003] Multiple Cross Site Scripting Vulnerabilities in Nuked-Klan

.: Multiple Cross Site Scripting Vulnerabilities in Nuked-Klan :.

________________________________________________________________________

Security Corporation Security Advisory [SCSA-003]
________________________________________________________________________

PROGRAM: Nuked-Klan
HOMEPAGE: http://www.nuked-klan.org
VULNERABLE VERSIONS: beta 1.2 and prior
________________________________________________________________________


DESCRIPTION
________________________________________________________________________

Nuked Klan is a PHP Gateway for "clans". (direct quote from Nuked Klan
website)


DETAILS & EXPLOITS
________________________________________________________________________

Many Cross-Site Scripting vulnerabilities have been found in Nuked Klan
which allow attackers to inject script codes into the page and use them on
clients browser as if they were provided by the site.


These Cross-Site Scripting vulnerabilities are found in the following
modules : Guestbook, Forum, Shoutbox.

An attacker can input specially crafted links and/or other malicious
scripts.


Guestbook
________________________________________________________________________

A vulnerability was discovered in the page for posting messages, at this
adress :

http://[target]/index.php?file=Guestbook&req=post_book


The vulnerability is at the level of the interpretation of the "Author"
field.

Indeed, the insertion of a hostile code script in this field makes it
possible to a malicious user to carry out this script on the navigator of
the visitors.


The hostile code could be :

[script]alert("Cookie="+document.cookie)[/script]

(open a window with the cookie of the visitor.)

(replace [] by <>)



Forum
________________________________________________________________________

A vulnerability was discovered in the page for posting new messages in the
forum, at this adress :

http://[target]/index.php?file=Forum&op=post_screen&forum_id=0

The vulnerability is at the level of the interpretation of the "Titre" and
"Pseudo" field.

Indeed, the insertion of a hostile code script in this field makes it
possible to a malicious user to carry out this script on the navigator of
the visitors.

The hostile code could be :

[script]alert("Cookie="+document.cookie)[/script]

(open a window with the cookie of the visitor.)

(replace [] by <>)



Shoutbox
________________________________________________________________________

A vulnerability was discovered in the page for posting messages in "La
Tribune Libre".

Indeed, the insertion of a hostile code script in this field makes it
possible to a malicious user to carry out this script on the navigator of
the visitors.

The hostile code could be :

[script]alert("Cookie="+document.cookie)[/script]

(open a window with the cookie of the visitor.)

(replace [] by <>)


-------Vulnerable line in submit.php--------

$shout = str_replace("|","",$SB_text);

--------------------------------------------


Possible solutions: modify the code in order to analyze the whole of the
text sent by the user and to replace the hostile elements.


---------------Code example-----------------
<?
$SB_text = str_replace("<", "[", $SB_text);
$SB_text = str_replace(">", "]", $SB_text);
$SB_text = htmlentities($SB_text);
$shout = str_replace("|","",$SB_text);
?>
--------------------------------------------


SOLUTIONS
________________________________________________________________________

Upgrade your version to beta 1.3


Upgrade Guestbook with the appropriate patch :
http://tomysnockers.net/download/Guestbook.rar

Upgrade Shoutbox with the appropriate patch :
http://www.nuked-klan.org/files/Shoutbox_13.zip



VENDOR STATUS
________________________________________________________________________

The vendor has reportedly been notified.


LINKS
________________________________________________________________________

http://www.security-corp.org/index.php?ink=4-15-1




-----------------------------------------------------------------
Gr?gory Le Bras aka GaLiaRePt | http://www.Security-Corp.org
-----------------------------------------------------------------




Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ