Exploit Simple Machines Forum (SMF) 1.0 - Size Tag HTML Injection

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
24082
Проверка EDB
  1. Пройдено
Автор
CHENG PENG SU
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2004-1996
Дата публикации
2004-05-05
Код:
source: https://www.securityfocus.com/bid/10281/info

It has been reported that Simple Machines Forum (SMF) may be prone to an HTML injection vulnerability that may allow an attacker to execute arbitrary HTML or script code in a user's browser. The issue exists due to insufficient sanitization of user-supplied input via the font size attribute.

Exploitation could allow for theft of cookie-based authentication credentials. Other attacks are also possible.

An attacker could reportedly post content to the forums containing:

[size=expression(alert(document.cookie))]Content[/size]

With the limit that the forum software filters out quotes, apostrophes and semicolons.

Another method that circumvents the software filtering would be to post content such as:

[size=expression(eval(unescape(document.URL.substring(document.URL.length-34,document.URL.length))))]Content[/size]

then get the victim to follow:

http://www.example.com/index.php?topic=12345.0&alert('cookie:\n'+document.cookie)

Where the '12345.0' is the topic containing the previously posted content. The victim's browser would execute the last 34 characters (as specified in the previously posted 'length-34' content).
 
Источник
www.exploit-db.com

Похожие темы