YaBB Remote UsersRecentPosts Cross-Site Scripting Vulnerability
BID:12756
Info
YaBB Remote UsersRecentPosts Cross-Site Scripting Vulnerability
| Bugtraq ID: | 12756 |
| Class: | Input Validation Error |
| CVE: |
CVE-2005-0785 |
| Remote: | Yes |
| Local: | No |
| Published: | Mar 08 2005 12:00AM |
| Updated: | Jul 12 2009 10:56AM |
| Credit: | trueend5 is credited with the discovery of this issue. |
| Vulnerable: |
YaBB YaBB 2.0 RC1 |
| Not Vulnerable: | |
Discussion
YaBB Remote UsersRecentPosts Cross-Site Scripting Vulnerability
A remote cross-site scripting vulnerability affects YaBB. This issue is due to a failure of the application to properly sanitize user-supplied input prior to including it in dynamically generated Web content.
An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.
A remote cross-site scripting vulnerability affects YaBB. This issue is due to a failure of the application to properly sanitize user-supplied input prior to including it in dynamically generated Web content.
An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.
Exploit / POC
YaBB Remote UsersRecentPosts Cross-Site Scripting Vulnerability
No exploit is required to leverage this issue. The following proof of concepts have been provided:
http://www.example.com/YaBB.pl?action=usersrecentposts;username=<IFRAME%20SRC%3Djavascript:alert('PersianHacker.NET-XSS')><%252FIFRAME>
http://wordforlife.com/cgi-bin/yabb2/YaBB.pl?action=usersrecentposts;username=<IFRAME%20SRC%3Djavascript:alert('PersianHacker.NET-XSS')><%252FIFRAME>
http://yabbtest.spikecity.net/cgi-bin/SP2/YaBB.pl?action=usersrecentposts;username=<IFRAME%20SRC%3Djavascript:alert('PersianHacker.NET-XSS')><%252FIFRAME>
No exploit is required to leverage this issue. The following proof of concepts have been provided:
http://www.example.com/YaBB.pl?action=usersrecentposts;username=<IFRAME%20SRC%3Djavascript:alert('PersianHacker.NET-XSS')><%252FIFRAME>
http://wordforlife.com/cgi-bin/yabb2/YaBB.pl?action=usersrecentposts;username=<IFRAME%20SRC%3Djavascript:alert('PersianHacker.NET-XSS')><%252FIFRAME>
http://yabbtest.spikecity.net/cgi-bin/SP2/YaBB.pl?action=usersrecentposts;username=<IFRAME%20SRC%3Djavascript:alert('PersianHacker.NET-XSS')><%252FIFRAME>
Solution / Fix
YaBB Remote UsersRecentPosts Cross-Site Scripting Vulnerability
Solution:
The vendor has released updates to address this vulnerability. The vendor suggests that customers upgrade to the latest development version: 'YaBB 2, March 14th (031405)'.
YaBB YaBB 2.0 RC1
Solution:
The vendor has released updates to address this vulnerability. The vendor suggests that customers upgrade to the latest development version: 'YaBB 2, March 14th (031405)'.
YaBB YaBB 2.0 RC1
-
YaBB YaBB_2_RC1_031405.zip
http://www.yabbforum.com/downloads.php?file=YaBB_2_RC1_031405.zip
References
YaBB Remote UsersRecentPosts Cross-Site Scripting Vulnerability
References:
References: