mvnForum 1.1 Cross Site Scripting

Risk: Low
Local: No
Remote: Yes

CVSS Base Score: 4.3/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 mvnForum Cross Site Scripting Vulnerability Original release date: 2008-04-27 Last revised: 2008-05-06 Latest version: Source: Christian Holler <> Systems Affected: mvnForum 1.1 ( - A Java J2EE/Jsp/Servlet forum Severity: Moderate Overview: An attacker who has the rights to start a new thread or to reply to an existing one, is able to include javascript code using the topic, that is executed when other users use the quick reply button shown for every post. This point of injection is possible because the topic text is part of an "onclick" event used for the quick reply function and the software only escapes characters that are typical for HTML cross site script attacks. In this case, the single quote character is not escaped. I. Description The list of standard functions for threads includes a typical feature called "quick reply". For user convenience, each post has a button that jumps to the form field allowing to send a quick reply, whilst changing the topic text of the reply at the top of this form. This is accomplished using javascript and the topic that is replied to. The source code for this button looks like this: <a href="#message" onclick="QuickReply('24','Re: Some thread topic');"> <img src="/forum/mvnplugin/mvnforum/images/icon/button_quick_reply.gif" border="0" alt="Quick reply to this post" title="Quick reply to this post" /></a> Because single quotes are not escaped in the topic context, it is possible to break out of the second argument and execute arbitrary javascript code in the client's browser. II. Impact Any user that is allowed to post anywhere can use this flaw to steal sensitive information such as cookies from other users. Especially because the forum uses simple reusable MD5 hashes in their cookies, this attack makes it possible to gain unauthorized access to other user accounts. However, this attack relies on the user to click the quick reply button and should therefore be considered only a moderate risk. III. Proof of concept Creating a new thread or replying to a thread with the following subject will demonstrate the problem after hitting the "quick reply" button above the post text. Test', alert('XSS ALERT') , ' IV. Solution At the time of writing, a fix is available in CVS. vnforum/user/viewthread.jsp?r1=1.316&r2=1.317 Timeline: 2008-04-27: mvnForum authors informed 2008-05-01: Fix available in CVS 2008-05-06: Vulnerability notice published -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.6 (GNU/Linux) iD8DBQFIIMEXJQIKXnJyDxURAlOPAJ96XH9zfjLJ1jMjCCpheurxwJuqMACfbz2S FWggJDc19FDPXiiyS+AP9iU= =Tixo -----END PGP SIGNATURE-----

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2021,


Back to Top