XMB Cross Site Scripting and SQL Injection Vulnerabilities
SECUNIA ADVISORY ID:
Cross Site Scripting, Exposure of sensitive information
Janek Vind has reported multiple vulnerabilities in XMB, allowing malicious people to conduct Cross Site Scripting and SQL injection attacks.
The Cross Site Scripting vulnerabilities are caused due to lack of input validation. Some vulnerabilities may require that certain characters are URL encoded. This allows malicious people to inject arbitrary HTML and script code.
- "forumdisplay.php" fails to verify input to the "foobar" parameter.
- "member.php" fails to verify input to the "member" parameter.
- "u2uadmin.php" fails to verify input to the "uid" parameter.
- "editprofile.php" fails to verify input to the "user" parameter.
The BBcode allowing users to format their messages can be exploited to inject arbitrary script code by including parameters with script code.
- "[img=1x1][/img]" can contain arbitrary script code instead of an image reference if it is suffixed with ";//gif"
The SQL injection vulnerabilities are caused to due to lack of input validation. A sample exploit has been published which exploits issue 10 to reveal the administrative username and password hash.
- "viewthread.php" fails to verify input to the "ppp" parameter.
- "misc.php" fails to verify input to the "desc" parameter.
- "forumdisplay.php" fails to verify input to the "tpp" and "ascdesc" parameters.
- "stats.php" fails to verify input to the "addon" parameter.
The vulnerabilities have been reported in version 1.8 SP 2.
- Edit the source code to filter out malicious characters.
- Use another product.
PROVIDED AND/OR DISCOVERED BY:
Janek Vind "waraxe"
For further details and links please click here to see the actual Secunia Advisory: http://secunia.com/advisories/10963/