Lucene search

K

EV0086.txt

🗓️ 08 Mar 2006 00:00:00Reported by Aliaksandr HartsuyeuType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 28 Views

New eVuln Advisory: Simple Machines Forum 'X-Forwarded-For' XSS Vulnerability. Variable $_SERVER['HTTP_X_FORWARDED_FOR'] isn't properly sanitized, posing a threat to the administrator's session

Show more

5 of 5AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Related
Code
ReporterTitlePublishedViews
Family
Cvelist
CVE-2006-0896
25 Feb 200611:00
cvelist
Prion
Cross site scripting
25 Feb 200611:02
prion
NVD
CVE-2006-0896
25 Feb 200611:02
nvd
securityvulns
[eVuln] Simple Machines Forum - SMF 'X-Forwarded-For' XSS Vulnerability
6 Mar 200600:00
securityvulns
CVE
CVE-2006-0896
25 Feb 200611:02
cve
`New eVuln Advisory:  
Simple Machines Forum - SMF 'X-Forwarded-For' XSS Vulnerability  
http://evuln.com/vulns/86/summary.html  
  
--------------------Summary----------------  
eVuln ID: EV0086  
CVE: CVE-2006-0896  
Software: Simple Machines Forum - SMF  
Sowtware's Web Site: http://www.simplemachines.org/  
Versions: 1.0.6  
Critical Level: Harmless  
Type: Cross-Site Scripting  
Class: Remote  
Status: Unpatched. Developer(s) contacted.  
Exploit: Available  
Solution: Not Available  
Discovered by: Aliaksandr Hartsuyeu (eVuln.com)  
  
-----------------Description---------------  
Vulnerable script: Sources/Register.php  
  
Variable $_SERVER['HTTP_X_FORWARDED_FOR'] isn't properly sanitized. This can be used to post HTTP query with fake X-Forwarded-For value which may contain arbitrary html or script code. This code will be executed when administrator will open "View all members" section in Administrator's control panel .  
  
Administrator's session is threatened.  
  
--------------Exploit----------------------  
Available at: http://evuln.com/vulns/86/exploit.html  
  
Example of HTTP POST Query:  
  
  
POST /smf/index.php? PHPSESSID=fa9c180d0a3f5fae0de2d56ba6fce944&action=register2 HTTP/1.0  
Host: [host]  
X-Forwarded-For: anyIP[XSS]  
Cookie: PHPSESSID=fa9c180d0a3f5fae0de2d56ba6fce944  
Content-Length: 81  
  
user=mmm&[email protected]&passwrd1=mmm&passwrd2=mmm&regagree=1&regSubmit=Register  
  
--------------Solution---------------------  
No Patch available.  
  
--------------Credit-----------------------  
Discovered by: Aliaksandr Hartsuyeu (eVuln.com)  
  
  
Regards,  
Aliaksandr Hartsuyeu  
http://evuln.com - Penetration Testing Services  
.  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo