TUCoPS :: Web :: Apps :: b06-2273.htm

Boastmachine Cross Site Scripting Vulnerability
Boastmachine Cross Site Scripting Vulnerability
Boastmachine Cross Site Scripting Vulnerability



Advisory : Cross Site Scripting in Boastmachine (http://boastology.com/)=0D 
Release Date  : 17/05/2005=0D
Last Modified : 17/05/2005=0D
Author : Yunus Emre Yilmaz ( http://yns.zaxaz.com)=0D 
Application   : BoastMachine v3.1 ( maybe older versions)=0D
Risk          : High=0D
=0D
Problem : Form action values in admin.php and index.php (maybe other pages) isn't properly sanitized before being returned to page.Form action value=0D
is otomatically coming from $_SERVER["PHP_SELF"];.And This is changeable from query string.=0D
=0D
If I access page like admin.php/XSS $_SERVER["PHP_SELF"] returns as admin.php/XSS.So , an attacker basicly inject malicious=0D
HTML/JS codes into page.=0D
=0D
Proof Of Concept : admin.php/">=0D
=0D
Solution : Edit the source code , and change it $_SERVER["SCRIPT_NAME"] or filter it before printing in page.=0D
=0D
Original Advisory : http://yns.zaxaz.com/advisories/bostmachine.txt 

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH