vBulletin Radio and TV Player Add-On HTML Injection Vulnerability

2009-06-24 / 2009-06-25
Credit: d3v1l
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


CVSS Base Score: 4.3/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

vBulletin Radio and TV Player Add-On (all version) - XSS , Iframe injection and Redirect Vulnerability About:- Radio and TV Add-on will add a radio and TV library to your forum. Features:- - Users can add / delete / edit own stations For more info about this plugin See - http://www.vbulletin.org/forum/showthread.php?t=152037&page=2 Note:- - To exploit this Bug need to be registred!and after you are registered you can add new radio station where name station can be "><script>alert(String.fromCharCode(88,83,83))</script> and URL "><script>alert(String.fromCharCode(88,83,83))</script> Poc: XSS http://www.musicadigitale.net/forum/radioandtv.php?station=92 Poc: Iframe http://www.musicadigitale.net/forum/radioandtv.php?station=93 Poc: Redirect http://www.musicadigitale.net/forum/radioandtv.php?station=94 dorks:- inurl:radioandtv.php Bug founded by d3v1l [Avram Marius] Date: 14.06.2009


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top