dotNetBB iforget.aspx Email Field XSS

2006-03-25T22:24:02
ID OSVDB:24122
Type osvdb
Reporter r0t(krustevs@googlemail.com)
Modified 2006-03-25T22:24:02

Description

Vulnerability Description

dotNetBB contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'em' variable upon submission to the iforget.aspx script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

dotNetBB contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'em' variable upon submission to the iforget.aspx script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

References:

Vendor URL: http://www.dotnetbb.com/ Secunia Advisory ID:19398 Other Advisory URL: http://pridels.blogspot.com/2006/03/xss-vuln-in-dotnetbb-v24.html FrSIRT Advisory: ADV-2006-1098 CVE-2006-1415 Bugtraq ID: 17246