发布时间 :2002-12-31 00:00:00
修订时间 :2008-09-05 16:32:07

[原文]Cross-site scripting (XSS) vulnerability in WoltLab Burning Board (wbboard) 1.1.1 allows remote attackers to inject arbitrary web script or HTML via the message parameter.

[CNNVD]Burning Board跨站脚本执行漏洞(CNNVD-200212-095)

        Burning Board是一款由PHP编写,MySQL后台支持的WEB论坛程序,可运行在Unix和Linux操作系统下,也可以运行在Microsoft windows操作系统下。
        Burning Board对用户提交的URL参数缺少正确的检查,可导致远程攻击者进行跨站脚本执行攻击。

- CVSS (基础分值)

CVSS分值: 4.3 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: MEDIUM [漏洞利用存在一定的访问条件]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BID  4512
(UNKNOWN)  XF  burningboard-bbs-css(8841)
(UNKNOWN)  BUGTRAQ  20020413 wbboard 1.1.1 Cross Site Scripting Vulnerability

- 漏洞信息

Burning Board跨站脚本执行漏洞
中危 输入验证
2002-12-31 00:00:00 2005-10-20 00:00:00
        Burning Board是一款由PHP编写,MySQL后台支持的WEB论坛程序,可运行在Unix和Linux操作系统下,也可以运行在Microsoft windows操作系统下。
        Burning Board对用户提交的URL参数缺少正确的检查,可导致远程攻击者进行跨站脚本执行攻击。

- 公告与补丁


- 漏洞信息 (21380)

Burning Board 1.1.1 URL Parameter Manipulation Vulnerability (EDBID:21380)
php webapps
2002-04-15 Verified
0 SeazoN
N/A [点击下载]

Burning Board is web forum software. It is written in PHP, back-ended by MySQL, and will run on most Unix and Linux variants as well as Microsoft Windows.

An attacker may allegedly create a malicious link which is capable of causing actions to be performed on the behalf of a legitimate Burning Board user who visits the link. To exploit this vulnerability, the attacker must manipulate URL parameters in the malicious link in such a way as to cause the desired actions to be performed by a user who visits the link. The legitimate forum user must also be authenticated via a cookie-based authentication credential. The malicious link may include BBCode.

It has been reported, but not confirmed, that other web forum software (such as phpBB) may also be affected by this vulnerability. 

1. Create a script exploit.php

exploit.php // with php U can dynamicaly redirect to the same treads & boardid (parsing $HTTP_REFERER)
header ("Location:
eros/236.jpg[/IMG]&signature=1"); /* Redirect browser*/

2.Register in forum
3.Send a message like this
"Hey, I know how to exploit this forum [URL][/URL]" 		

- 漏洞信息

WoltLab Burning Board (wbboard) reply.php message Parameter CSRF
Context Dependent Input Manipulation
Loss of Integrity
Exploit Public

- 漏洞描述

WoltLab Burning Board (wbboard) contains a flaw that allows a remote Cross-site Request Forgery (CSRF / XSRF) attack. The flaw exists because the application does not require multiple steps or explicit confirmation for sensitive transactions for the reply functionality. By using a crafted URL (e.g., a crafted GET request inside an "img" tag), an attacker may trick the victim into clicking on the image to take advantage of the trust relationship between the authenticated victim and the application. Such an attack could trick the victim into executing arbitrary commands in the context of their session with the application, without further prompting or verification.

- 时间线

2002-04-13 Unknow
2002-04-13 Unknow

- 解决方案

Currently, there are no known upgrades, patches or workarounds available to correct this vulnerability.

- 相关参考

- 漏洞作者

Unknown or Incomplete