Phorum 3.3.2 - Cross-Site Scripting

Author: markus arndt
type: webapps
platform: php
port: 
date_added: 2002-05-18  
date_updated: 2012-09-22  
verified: 1  
codes: OSVDB-11145;OSVDB-11144  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 21461.txt  
source: https://www.securityfocus.com/bid/4767/info

Phorum is a PHP based web forums package designed for most UNIX variants, Linux, and Microsoft Windows operating systems.

The 'header.php' and 'footer.php' components of Phorum do not santize the client-supplied value of the 'GLOBALS' parameter prior to output. As a result, script commands embedded in these variables will be executed by the client in the context of Phorum.

Attackers may exploit this vulnerability to obtain user credentials.

http://[host]/phorum/admin/footer.php?GLOBALS[message]=<script>alert("css strikes!");</script>

http://[host]/phorum/admin/header.php?GLOBALS[message]=<script>alert("css strikes!");</script>