vBulletin 4.2.0 Cross Site Scripting

2012.06.20
Credit: sangteamtham
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79

$------------------------------------------------------------------------------------------------------------ $ vBulletin 4.2.0 XSS Vulnerability $ Author : sangteamtham $ Home : Hcegroup.vn $ Download: http://members.vbulletin.com/ $ Date :06/13/2012 $ Google Dork: "Powered by vBulletin Version 4.2.0" $ Twitter: http://twitter.com/Sangte_amtham $************************************************************************************************************* 1.vBulletin Description: Content publishing, search, security, and more vBulletin has it all. Whether its available features, support, or ease-of-use, vBulletin offers the most for your money. Learn more about what makes vBulletin the choice for people who are serious about creating thriving online communities. 2. Vulnerability Description: To steal cookie from administrator or any member in a forum or drive them to malicious sites, attacker will firstly create an account, then come to calendar section, and create an event for himself. In title, he will inject XSS code there. For sample: "><img src=x onerror=alert(1)> In content section, he will write everything he likes. Now, he will send his profile to Administrator or any member and wait for cookie or victims' infection. http://127.0.0.1/vbb/member.php?id-xyz 3. Patch: June 13, 2012: Contacted the vendor. June 14, 2012: Vendor replied me. June 18, 2012: the vendor released the patch for this vulnerabitily. Please download it from member Area right now. https://members.vbulletin.com/patches.php $*********************************** $ Greetz to: All Vietnamese hackers and Hackers out there researching for more security $ $ $---------------------------------------------------------------------------------------------------------------

References:

https://members.vbulletin.com/patches.php


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top