Powie PForum 1.1x - 'Username' Cross-Site Scripting
Author: Jens Liebchen
type: webapps
platform: php
port:
date_added: 2002-02-22
date_updated: 2012-09-12
verified: 1
codes: CVE-2002-0319;OSVDB-9285
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/4165/info
Powie PForum is web forum software, written in PHP and back-ended by MySQL. It will run on most Unix and Linux variants, as well as Microsoft Windows operating systems.
PForum is prone to cross-site scripting attacks. It is possible for an attacker to construct a malicious link which includes arbitrary script code. In particular, the username URL parameter does not filter variations of HTML tags. A legitimate user who browses the malicious link will have the attacker-supplied script code executed in their browser, in their context of the website running the vulnerable software.
This may enable an attacker to steal cookie-based authentication credentials from the legitimate user.
http://www.server.com/pforum/edituser.php?boardid=&agree=1
&username=%3Cscript%3Ealert(document.cookie)%3C/script%3E
&nickname=test&email=test@test.com&pwd=test&pwd2=test&filled=1