[34325] in bugtraq

home help back first fref pref prev next nref lref last post

phpkit suffers (reale stupid) XSS vuln.

daemon@ATHENA.MIT.EDU (Yanosz)
Tue Mar 30 16:22:51 2004

From: Yanosz <yanosz@gmx.net>
To: bugtraq@securityfocus.com
Date: Tue, 30 Mar 2004 21:52:39 +0200
Cc: henrik.schott@phpkit.de, webmaster@phpkit.de
MIME-Version: 1.0
Content-Type: text/plain;
  charset="utf-8"
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
Message-Id: <200403302152.39469.yanosz@gmx.net>

Software: phpkit
Version: 1.6.03 others are probably affected as well.
Status: Vendor has been notified weeks ago but refuses to answer or take any 
actions.
phpkit[1] is a simple German cms / portal software written in php similar to 
phpbb / phpnuke and is quite popular in Germany. All session information is 
stored in cookies - thus a attacker can easily steal session data or hashed 
passwords.

The forum part has _no_ protection against JavaScript, Object or Java 
injections - all html-tags appear in the victim's browser.

Proof-of-concept code
That's odd - <script... ;)

The source also seems to be vulnerably to SQL-injections - good luck ;)

Workaround: 
Don't use this software. These guys do not seem to know what they are doing.

Keep smiling
yanosz

[1]http://www.phpkit.de


home help back first fref pref prev next nref lref last post