*Artnana Webboard version 1.4 XSS (Cross-site Scripting) Web Security
Vulnerabilities*
Exploit Title: Artnana Webboard version 1.4 Multiple XSS Security
Vulnerabilities
Product: Webboard
Vendor: Artnana
Vulnerable Versions: version 1.4
Tested Version: version 1.4
Advisory Publication: May 09, 2015
Latest Update: May 09, 2015
Vulnerability Type: Cross-Site Scripting [CWE-79]
CVE Reference: *
Impact CVSS Severity (version 2.0):
CVSS v2 Base Score: 4.3 (MEDIUM) (AV:N/AC:M/Au:N/C:N/I:P/A:N) (legend)
Impact Subscore: 2.9
Exploitability Subscore: 8.6
Writer and Reporter: Jing Wang [School of Physical and Mathematical
Sciences (SPMS), Nanyang Technological University (NTU), Singapore]
(@justqdjing)
*Proposition Details:*
*(1) Vendor & Product Description:*
*Vendor:*
Artnana
*Product & Vulnerable Versions:*
Webboard
version 1.4
*Vendor URL & Download:*
Webboard can be obtained from here,
http://www.artnana.com/web-d.php
*Product Introduction Overview:*
"Webboard is Thailand IT company that provide software service. Webboard
can make your website easier and convenience. WebBoard is a discussion
board where you post messages and participate in discussions with the other
people in the course."
*(2) Vulnerability Details:*
Artnana Webboard web application has a computer security bug problem. It
can be exploited by stored XSS attacks. This may allow a remote attacker to
create a specially crafted request that would execute arbitrary script code
in a user's browser session within the trust relationship between their
browser and the server.
Several other Artnana products 0-day vulnerabilities have been found by
some other bug hunter researchers before. Artnana has patched some of them.
FusionVM Vulnerability Management and Compliance provides sources for the
latest info-sec news, tools, and advisories. It has published suggestions,
advisories, solutions details related to XSS vulnerabilities.
*(2.1) *The first programming code flaw occurs at "&keyword" parameter in
"search_topic.php?" page.
*(2.2) *The second programming code flaw occurs at "&keyword" parameter in
"search_products.php" page.
*References:*
http://www.tetraph.com/security/xss-vulnerability/artnana-webboard-version-1-4-xss/
http://securityrelated.blogspot.com/2015/05/artnana-webboard-version-14-xss-cross.html
https://vulnerabilitypost.wordpress.com/2015/05/08/artnana-webboard-version-1-4-xss/
http://diebiyi.com/articles/%E5%AE%89%E5%85%A8/artnana-webboard-version-1-4-xss/
http://whitehatpost.blog.163.com/blog/static/24223205420154895051990/#
https://progressive-comp.com/?a=139222176300014&r=1&w=1?
https://www.fusionvm.com/FusionVM/DesktopModules/SecurityAdvisories/SecurityAdvisoriesView.aspx?Alias=www.fusionvm&TabId=0&Lang=en-US&OU=0&ItemId=44831
https://www.bugscan.net/#!/x/21221
http://bluereader.org/article/30765597
--
Jing Wang,
Division of Mathematical Sciences (MAS),
School of Physical and Mathematical Sciences (SPMS),
Nanyang Technological University (NTU),
Singapore.
http://www.tetraph.com/wangjing/
https://twitter.com/justqdjing