1. Technology
You can opt-out at any time. Please refer to our privacy policy for contact information.

[SA10963] XMB Cross Site Scripting and SQL Injection Vulnerabilities

XMB Cross Site Scripting and SQL Injection Vulnerabilities

By

TITLE:
XMB Cross Site Scripting and SQL Injection Vulnerabilities

SECUNIA ADVISORY ID:
SA10963

VERIFY ADVISORY:
http://secunia.com/advisories/10963/

CRITICAL:
Moderately critical

IMPACT:
Cross Site Scripting, Exposure of sensitive information

WHERE:
From remote

SOFTWARE:
XMB 1.x

DESCRIPTION:
Janek Vind has reported multiple vulnerabilities in XMB, allowing malicious people to conduct Cross Site Scripting and SQL injection attacks.

The Cross Site Scripting vulnerabilities are caused due to lack of input validation. Some vulnerabilities may require that certain characters are URL encoded. This allows malicious people to inject arbitrary HTML and script code.

  1. "forumdisplay.php" fails to verify input to the "foobar" parameter.

  2. "member.php" fails to verify input to the "member" parameter.

  3. "u2uadmin.php" fails to verify input to the "uid" parameter.

  4. "editprofile.php" fails to verify input to the "user" parameter.

    The BBcode allowing users to format their messages can be exploited to inject arbitrary script code by including parameters with script code.

  5. "[align=xxx][/align]" can be manipulated to execute javascript by including a "onmouseover" parameter in the "align" tag.

  6. "[img=1x1][/img]" can contain arbitrary script code instead of an image reference if it is suffixed with ";//gif"

    The SQL injection vulnerabilities are caused to due to lack of input validation. A sample exploit has been published which exploits issue 10 to reveal the administrative username and password hash.

  7. "viewthread.php" fails to verify input to the "ppp" parameter.

  8. "misc.php" fails to verify input to the "desc" parameter.

  9. "forumdisplay.php" fails to verify input to the "tpp" and "ascdesc" parameters.

  10. "stats.php" fails to verify input to the "addon" parameter.

The vulnerabilities have been reported in version 1.8 SP 2.

SOLUTION:

  • Edit the source code to filter out malicious characters.

  • Use another product.

PROVIDED AND/OR DISCOVERED BY:
Janek Vind "waraxe"

For further details and links please click here to see the actual Secunia Advisory: http://secunia.com/advisories/10963/

©2014 About.com. All rights reserved.