XOOPS newbb Module edit.php order Variable XSS

2005-06-29T04:19:33
ID OSVDB:17633
Type osvdb
Reporter James Bercegay()
Modified 2005-06-29T04:19:33

Description

Vulnerability Description

Xoops contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'order' variable upon submission to the 'edit.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Upgrade to version 2.0.12a or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

Xoops contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'order' variable upon submission to the 'edit.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Manual Testing Notes

http://[target]/modules/newbb/edit.php?forum=1&topic_id=1&viewmode=flat&order=ASC"><script>alert(document.cookie)</script>&post_id=1

References:

Vendor URL: http://www.xoops.org/ Vendor Specific Advisory URL Secunia Advisory ID:15843 Related OSVDB ID: 17634 Related OSVDB ID: 17635 Other Advisory URL: http://www.gulftech.org/?node=research&article_id=00086-06292005 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2005-06/0258.html ISS X-Force ID: 21202 CVE-2005-2112 Bugtraq ID: 14096