Software PBLang 4.65 pm.php XSS vulnerability
[][][][][][][][][][][][][][][][][][][][][][][][][][]
[][][]
[]
[] HRG - Hackerlounge Research Group
[] Release: HRG003
[] Friday 11-02-05
[] Software PBLang 4.65 pm.php XSS vulnerability
[]
[] The author can't be held responsible for any
damage
[] done by a reader. You have your own resonsibility
[] Please use this document like it's meant to.
[]
[][][][][][][][][][][][][][][][][][][][][][][][][][]
[][][]
Vulnerable: PBLang 4.65 (current) (and earlier?)
---
General information:
PBLang is an international BBS-software based on
PHP. It does not require any database but bases on a
flatfile system. Many professional features. More
info on the project website.
---
Description:
When a user receives a PM with a HTML in the
subject, it will be executed as soon as the user
opens his pm.php. This may give an attacker the
opportunity for a session steal. The link for the PM
will not be linked, so viewing the contents of the
message gets harder. An attacker could also flood a
users PM box by sending messages with a title like
<script>
and the PM will not appear in the receivers window,
while it will say he/she has got a new PM.
---
Proof Of Concept:
Type in the subject box "<script
language="javascript">alert("Hackerlounge.com pwns
joo");</script>" and submit. An alertbox with the
text "Hackerlounge.com pwns joo" should come up when
a user visits pm.php.
---
Fix and Vendor status:
Vendor has been notified, expect an official patch
soon.
---
Credit:
HRG - Hackerlounge Research Group
Hackerlounge.com
[][][][][][][][][][][][][][][][][][][][][][][][][][]
[][][]
[]
[] HRG - Hackerlounge Research Group
[] Release: HRG003
[] Friday 11-02-05
[] Software PBLang 4.65 pm.php XSS vulnerability
[]
[] The author can't be held responsible for any
damage
[] done by a reader. You have your own resonsibility
[] Please use this document like it's meant to.
[]
[][][][][][][][][][][][][][][][][][][][][][][][][][]
[][][]