1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 |
Dear Offensive Security, I have discovered some vulnerabilities in Basic Forum, developed by JM LLC. Best regards, Sp3ctrecore ########## ADVISORY ########## ================================================ Basic Forum by JM LLC - Multiple Vulnerabilities ================================================ Software................: Basic Forum Software link...........: http://www.jmagness.com/download/Basic_Forum.zip Vendor..................: JM LLC Vendor homepage.........: http://www.jmagness.com Exploit author..........: Sp3ctrecore Contact.................: sp3ctrecore[at]gmail[dot]com -------- OVERVIEW -------- Basic Forum is affected by multiple vulnerabilities. ------------------- DISCLOSURE TIMELINE ------------------- 04/07/2013 -- Multiple vulnerabilities discovered and reported to the vendor. 19/07/2013 -- The vendor confirmed the vulnerabilities, but has no time to fix them. 24/07/2013 -- Public disclosure. --------------- VULNERABILITIES --------------- [01] MULTIPLE SQL INJECTIONS I. new.php - title parameter (POST request). II.new.php - post parameter (POST request). III. post.php?id=1 - reply parameter (POST request). [02] MULTIPLE CROSS-SITE SCRIPTING I. user.php - firstname parameter (POST request): stored XSS. II.user.php - bio parameter (POST request): stored XSS. III. new.php - title parameter (POST request): stored XSS. IV.new.php - post parameter (POST request): stored XSS. [03] Cross-site Request Forgery I. user.php - firstname parameter (POST request). II.user.php - email parameter (POST request). III. user.php - password parameter (POST request). IV.user.php - bio parameter (POST request). V. new.php- title parameter (POST request). VI.new.php- post parameter (POST request). VII. post.php - reply parameter (POST request). |