XSS Vulnerabilities in UseBB
Advisory by Netsparker (now Invicti)
Name: XSS Vulnerabilities in UseBB
Software: UseBB v1.0.15 and possibly below.
Vendor Homepage: http://www.usebb.net/
Vulnerability Type: Cross-Site Scripting
Researcher: Omar Kurt
Advisory Reference: NS-14-004
UseBB 1, a classic PHP 4 based bulletin board package
UseBB is affected by XSS and Information Leak vulnerabilities in version 1.0.15.
Example PoC urls are as follows:
http://example.com/post.php?forum=1(POST ‘content’ param vulnerable to XSS)
http://example.com/edit.php?forum=1(POST ‘content’ param vulnerable to XSS)
- Information Leak
Cookie contains current user’s password hash (MD5)
You can read the full article about Cross-Site Scripting vulnerabilities from here:
Developer replied with fixes are in git.
26/02/2013 – First Contact – Request Security contact
05/05/2013 – Sent Vulnerabilities Details
26/06/2013 – Second Contact
15/07/2013 – Developer replied: fixes are in git.
29/01/2014 – Advisory Released
It has been discovered on testing of Invicti Web Application Security Scanner.
Invicti® can find and report security issues such as SQL Injection and Cross-site Scripting (XSS) in all web applications regardless of the platform and the technology they are built on. Invicti’s unique detection and exploitation techniques allows it to be dead accurate in reporting hence it’s the first and the only False Positive Free web application security scanner.