BOINC forum_text_search_action.php Multiple Cross-Site Scripting Vulnerabilities
BID:25644
Info
BOINC forum_text_search_action.php Multiple Cross-Site Scripting Vulnerabilities
| Bugtraq ID: | 25644 |
| Class: | Input Validation Error |
| CVE: |
CVE-2007-4899 |
| Remote: | Yes |
| Local: | No |
| Published: | Sep 12 2007 12:00AM |
| Updated: | May 07 2015 05:35PM |
| Credit: | DoZ is credited with the discovery of these vulnerabilities. |
| Vulnerable: |
University of California BOINC 5.10.20 |
| Not Vulnerable: | |
Discussion
BOINC forum_text_search_action.php Multiple Cross-Site Scripting Vulnerabilities
BOINC (Berkeley Open Infrastructure for Network Computing) is prone to multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied input data.
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
These issues affects BOINC 5.10.20; other versions may also be affected.
BOINC (Berkeley Open Infrastructure for Network Computing) is prone to multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied input data.
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
These issues affects BOINC 5.10.20; other versions may also be affected.
Exploit / POC
BOINC forum_text_search_action.php Multiple Cross-Site Scripting Vulnerabilities
To exploit these issues, an attacker must entice an unsuspecting user to follow a malicious URI.
The following proof-of-concept URIs are available:
http://www.example.com/forum_forum.php?id=[XSS]
http://www.example.com/forum_text_search_action.php?search_string=[XSS]&titles=Search
http://www.example.com/forum_text_search_action.php?search_string=[XSS]&bodies=Search
To exploit these issues, an attacker must entice an unsuspecting user to follow a malicious URI.
The following proof-of-concept URIs are available:
http://www.example.com/forum_forum.php?id=[XSS]
http://www.example.com/forum_text_search_action.php?search_string=[XSS]&titles=Search
http://www.example.com/forum_text_search_action.php?search_string=[XSS]&bodies=Search
Solution / Fix
BOINC forum_text_search_action.php Multiple Cross-Site Scripting Vulnerabilities
Solution:
Currently we are not aware of any vendor-supplied patches for these issues. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches for these issues. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
References
BOINC forum_text_search_action.php Multiple Cross-Site Scripting Vulnerabilities
References:
References:
- BOINC Homepage (University of California)
- Boinc Forum Cross Site Scripting Vulrnability ([email protected])