New User? Need help? Click here to register for free! Registering removes the advertisements.

Computer Cops
image image image image image image image image
Donations
If you found this site helpful, please donate to help keep it online
Don't want to use PayPal? Try our physical address
image
Prime Choice
· Head Lines
· Advisories (All)
· Dnld of the Week!
· CCSP News Ltrs
· Find a Cure!

· Ian T's (AR 23)
· Marcia's (CO8)
· Bill G's (CO11)
· Paul's (AR 5)
· Robin's (AR 2)

· Ian T's Archive
· Marcia's Archive
· Bill G's Archive
· Paul's Archive
· Robin's Archive
image
Security Central
· Home
· Wireless
· Bookmarks
· CLSID
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· RegChat
· Reviews
· Google Search
· Sections
· Software
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Survey
How much can you give to keep Computer Cops online?

$10 up to $25 per year?
$25 up to $50 per year?
$10 up to $25 per month?
$25 up to $50 per month?
More than $50 per year?
More than $50 per month?
One time only?
Other (please comment)



Results
Polls

Votes: 981
Comments: 19
image
Translate
English German French
Italian Portuguese Spanish
Chinese Greek Russian
image
Computer Cops: BBS - Portals

Search on This Topic:   
[ Go to Home | Select a New Topic ]

image Vulnerabilities: XSS Vulnerabilities Found in XMB Forum image
BBS - Portals
XMB Forum is "a free web-based bulletin board system written in PHP with a MySQL backend". Multiple cross site scripting vulnerabilities have been found in the XMB Forum, these vulnerabilities would allow attackers to insert malicious HTML and JavaScript code into existing web pages.
Posted by Paul  on Monday, 23 June 2003 @ 10:13:09 EDT (849 reads)
(» Read More... | 407 bytes more | TrackBack (0) | comments? | Vulnerabilities | Score: 0)
image

image Advisories!: Splatt Forum 4.0 for PHP-Nuke 6.0 Multiple Vulnerabilities image
BBS - Portals
Frame4 Security Advisory [FSA-2003:001]

Product : Splatt Forum 4.0 for PHP-Nuke 6.0
Product/Vendor URI : http://www.splatt.it/
Type: Vulnetablility / Exploit
Impact : Medium
Summary : Multiple Vulnerabilities in Splatt Forum 4.0
Disovery Date : 26/03/2003
Public Release : 01/05/2003
Affected Versions(S): Splatt Forum 4.0 (as of discovery date)
Fixed Versions(S) : Splatt Forum 4.0 Fix 1 (not tested)
Vendor Notified : No

Posted by cj  on Thursday, 01 May 2003 @ 23:11:26 EDT (582 reads)
(» Read More... | 1913 bytes more | TrackBack (0) | comments? | Advisories! | Score: 0)
image

image Advisories!: Snitz Forums 2000 Cross-Site Scripting image
BBS - Portals
April 18, 2003

Snitz Forums 2000 contains an input validation error, which can be exploited by malicious users to conduct Cross-Site Scripting attacks against other users.

The function "ReplaceImageTags()" in "inc_func_common.asp" doesn't validate user input in image tags properly. A malicious person can exploit this to insert script code into an image tag by including a horizontal tab char " " (ASCII 0x09) into the script command. Script code will be executed in the user's browser session, when the entry is viewed.
Posted by cj  on Friday, 18 April 2003 @ 09:40:19 EDT (672 reads)
(» Read More... | 1149 bytes more | TrackBack (0) | comments? | Advisories! | Score: 0)
image

image Vulnerabilities: ProBoards Forums Contains a XXS Vulnerability image
BBS - Portals
ProBoards is a popular online message board service. An XSS vulnerability allowed users to inject JavaScript into an [img] tag before it was fixed on November the 28th.
Posted by Paul  on Monday, 23 December 2002 @ 08:00:00 EST (1120 reads)
(» Read More... | 369 bytes more | TrackBack (0) | comments? | Vulnerabilities | Score: 0)
image

image Vulnerabilities: vBulletin Cross Sight HTML Scripting image
BBS - Portals
vBulletin Forum Fails to Filter Scripting Code From Certain HTML Tags, Permitting Cross-Site Scripting Attacks

An input validation vulnerability was reported in vBulletin. A remote user can conduct cross-site scripting attacks against vBulletin users.

It is reported that vBulletin does not properly validate user-supplied input in forums that allow HTML tags. A remote user can, for example, insert scripting code into the HTML <B> bold tag.

A remote user can post a message containing specially crafted HTML so that, when the message is viewed by a target user, arbitrary scripting code will be executed by the target user's browser. The code will originate from the site running vBulletin and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.
Posted by Paul  on Monday, 16 December 2002 @ 12:00:00 EST (795 reads)
(» Read More... | 1610 bytes more | TrackBack (0) | comments? | Vulnerabilities | Score: 0)
image

image Beware!: phpBB Advanced Quick Reply Mod Code Injection Vulnerability image
BBS - Portals
From: Hai Nam Luke
<[email protected]>

Software: phpBB Advanced Quick Reply Mod

I've found a security hole in this sofware (Code Injection). You can download this software at http://phpbbhacks.com/viewhack.php?id=586 Hackers can exploit this Mod to inject some shell code to hack your forum, your website or your server (local exploit) because Code Injection is a dangerous technique of hackers.

Exploit: (quick_reply.php)
Posted by Paul  on Tuesday, 19 November 2002 @ 08:35:00 EST (946 reads)
(» Read More... | 643 bytes more | TrackBack (0) | comments? | Beware! | Score: 0)
image

image Vulnerabilities: CA-2002-21: Vulnerability in PHP image
BBS - Portals
CERT Advisory CA-2002-21 Vulnerability in PHP

Original release date: July 22, 2002 Last revised: -- Source: CERT/CC

A complete revision history can be found at the end of this file.

Systems Affected

* Systems running PHP versions 4.2.0 or 4.2.1

Overview

A vulnerability has been discovered in PHP. This vulnerability could be used by a remote attacker to execute arbitrary code or crash PHP and/or the web server.

I. Description

PHP is a popular scripting language in widespread use. For more information about PHP, see

http://www.php.net/manual/en/faq.general.php

The vulnerability occurs in the portion of PHP code responsible for handling file uploads, specifically multipart/form-data. By sending a specially crafted POST request to the web server, an attacker can corrupt the internal data structures used by PHP. Specifically, an intruder can cause an improperly initialized memory structure to be freed. In most cases, an intruder can use this flaw to crash PHP or the web server. Under some circumstances, an intruder may be able to take advantage of this flaw to execute arbitrary code with the privileges of the web server.

You may be aware that freeing memory at inappropriate times in some implementations of malloc and free does not usually result in the execution of arbitrary code. However, because PHP utilizes its own memory management system, the implementation of malloc and free is irrelevant to this problem.
Posted by Paul  on Tuesday, 23 July 2002 @ 10:00:00 EDT (373 reads)
(» Read More... | 3293 bytes more | TrackBack (0) | comments? | Vulnerabilities | Score: 4)
image

image Vulnerabilities: Cross-Site Scripting Vulnerability in PHP Classifieds image
BBS - Portals
The PHP Classifieds is a classified program for use with unlimited categories and ads. A security vulnerability in the product allows attackers to cause a cross-site scripting vulnerability.
Posted by Paul  on Monday, 15 July 2002 @ 07:13:20 EDT (409 reads)
(» Read More... | 335 bytes more | TrackBack (0) | comments? | Vulnerabilities | Score: 0)
image

image Vulnerabilities: YaBB Invalid Topic Error Page Cross Site Scripting Vulnerability image
BBS - Portals
It is reported possible for attackers to construct a URL that will cause scripting code to be embedded in error pages.

YaBB fails to check URLs for the presence of script commands when generating error pages, allowing attacker supplied code to execute. If such a URL is sent to a YaBB user, upon accessing the link, the attacker-supplied code will run in the context of the site running the vulnerable software.

This issue may be exploited to steal cookie-based authentication credentials from legitimate users of YaBB.
Posted by Paul  on Sunday, 23 June 2002 @ 07:20:46 EDT (462 reads)
(» Read More... | 670 bytes more | TrackBack (0) | comments? | Vulnerabilities | Score: 0)
image

image Downloads: XSS URL Patch for PHP-Nuke image
BBS - Portals
This patch adds filters to protect against XSS in URLs. The following is filtered:

HTML Tags: script, iframe, object, applet, meta, style, form, img

In addition, the URL filters out any instance of quote marks.

Please note, this filtering code is only called on when the mainfile.php is included in your code. Example: modules.php includes mainfile.php whenever it calls any modules you have on the site. Hence, the URLs are filtered.

Why should you install this patch? To prevent users from crafting malicious URLs which could steal your members passwords, not to mention yours!

As a sample to see what happens when a quote is entered into the URL (include the quote in your copy/paste to the URL Address Bar):

http://www.computercops.biz/modules.php?name=Search"
Posted by Paul  on Saturday, 22 June 2002 @ 21:27:07 EDT (624 reads)
(» Read More... | 1057 bytes more | TrackBack (0) | comments? | Downloads | Score: 5)
image

Login
User Login

Nickname:
Password:
Security Code: Security Code
Type Security Code:
 
· New User? ·
Click here to create a registered account.
image
Forums Topics
Syndication