Toast Forums Toast.ASP Multiple Cross-Site Scripting Vulnerabilities
BID:17249
Info
Toast Forums Toast.ASP Multiple Cross-Site Scripting Vulnerabilities
| Bugtraq ID: | 17249 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Mar 27 2006 12:00AM |
| Updated: | Mar 27 2006 10:54PM |
| Credit: | rakstija r0t is credited with the discovery of this vulnerability. |
| Vulnerable: |
Toast Forums Toast Forums 1.6 |
| Not Vulnerable: | |
Discussion
Toast Forums Toast.ASP Multiple Cross-Site Scripting Vulnerabilities
Toast Forums is prone to multiple cross-site scripting vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input.
An attacker may leverage these issues to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
Version 1.6 and prior are vulnerable; other versions may also be affected.
Toast Forums is prone to multiple cross-site scripting vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input.
An attacker may leverage these issues to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
Version 1.6 and prior are vulnerable; other versions may also be affected.
Exploit / POC
Toast Forums Toast.ASP Multiple Cross-Site Scripting Vulnerabilities
An exploit is not required.
Example URIs have been provided:
http://www.example.com/toast.asp?action=posts&sub=search&fid=-1&author=[XSS]
http://www.example.com/toast.asp?action=posts&sub=search&fid=-1&author=r0t&subject=[XSS]
http://www.example.com/toast.asp?action=posts&sub=search&fid=-1&author=r0t&subject=&message=[XSS]
http://www.example.com/toast.asp?action=posts&sub=search&fid=-1&author=r0t&subject=&message=&dayprune=[XSS]
An exploit is not required.
Example URIs have been provided:
http://www.example.com/toast.asp?action=posts&sub=search&fid=-1&author=[XSS]
http://www.example.com/toast.asp?action=posts&sub=search&fid=-1&author=r0t&subject=[XSS]
http://www.example.com/toast.asp?action=posts&sub=search&fid=-1&author=r0t&subject=&message=[XSS]
http://www.example.com/toast.asp?action=posts&sub=search&fid=-1&author=r0t&subject=&message=&dayprune=[XSS]
Solution / Fix
Toast Forums Toast.ASP Multiple Cross-Site Scripting Vulnerabilities
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected]:[email protected]
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected]:[email protected]
References
Toast Forums Toast.ASP Multiple Cross-Site Scripting Vulnerabilities
References:
References:
- Toast Forums Web Site (Toast Forums)
- XSS in <= Toast Forums 1.6 (r0t)