
12 changes to exploits/shellcodes Free Download Manager 2.0 Built 417 - Local Buffer Overflow (SEH) Allok AVI to DVD SVCD VCD Converter 4.0.1217 - Buffer Overflow (SEH) Eudora Qualcomm WorldMail 9.0.333.0 - IMAPd Service UID Buffer Overflow Shopy Point of Sale v1.0 - CSV Injection Shopy Point of Sale 1.0 - CSV Injection Drupal < 7.58 - 'drupalgeddon3' Authenticated Remote Code Execution (PoC) Blog Master Pro v1.0 - CSV Injection HRSALE The Ultimate HRM v1.0.2 - CSV Injection HRSALE The Ultimate HRM v1.0.2 - 'award_id' SQL Injection Blog Master Pro 1.0 - CSV Injection HRSALE The Ultimate HRM 1.0.2 - CSV Injection HRSALE The Ultimate HRM 1.0.2 - 'award_id' SQL Injection HRSALE The Ultimate HRM v1.0.2 - Local File Inclusion HRSALE The Ultimate HRM 1.0.2 - Local File Inclusion Jfrog Artifactory < 4.16 - Unauthenticated Arbitrary File Upload / Remote Command Execution WordPress Plugin WP with Spritz 1.0 - Remote File Inclusion SickRage < v2018.03.09 - Clear-Text Credentials HTTP Response October CMS User Plugin 1.4.5 - Persistent Cross-Site Scripting MyBB Threads to Link Plugin 1.3 - Cross-Site Scripting GitList 0.6 - Unauthenticated Remote Code Execution TP-Link Technologies TL-WA850RE Wi-Fi Range Extender - Unauthenticated Remote Reboot Frog CMS 0.9.5 - Persistent Cross-Site Scripting
31 lines
No EOL
889 B
Text
31 lines
No EOL
889 B
Text
# Exploit Title: MyBB Threads to Link Plugin v1.3 - Persistent XSS
|
|
# Date: 3/15/2018
|
|
# Author: 0xB9
|
|
# Contact: luxorforums.com/User-0xB9 or 0xB9[at]protonmail.com
|
|
# Software Link: https://community.mybb.com/mods.php?action=view&pid=1065
|
|
# Version: v1.3
|
|
# Tested on: Ubuntu 17.10
|
|
CVE: CVE-2018-10365
|
|
|
|
|
|
1. Description:
|
|
When editing a thread the user is given to the option to convert the thread to a link.
|
|
|
|
|
|
2. Proof of Concept:
|
|
|
|
Persistent XSS
|
|
- Edit a thread or post you've made
|
|
- At the bottom of the edit page in the Thread Link box input the following <a """><SCRIPT>alert("XSS")</SCRIPT>">
|
|
- Now visit the forum your thread/post exists in to see the alert.
|
|
|
|
|
|
3. Solution:
|
|
The plugin has since been removed after notifying the author.
|
|
|
|
Patch in line 83:
|
|
$thread['tlink'] = ($thread['tlink']);
|
|
|
|
to
|
|
|
|
$thread['tlink'] = htmlspecialchars_uni($thread['tlink']); |