header-logo
Suggest Exploit
vendor:
Free Discussion Forum
by:
Abysssec Inc
8,8
CVSS
HIGH
Access to Admin's Section and Persistent XSS
79
CWE
Product Name: Free Discussion Forum
Affected Version From: Free Discussion Forum 1.0
Affected Version To: Free Discussion Forum 1.0
Patch Exists: YES
Related CWE: N/A
CPE: freediscussionforums.net
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2014

FreeDiscussionForums Multiple Remote Vulnerabilities

This version of FreeDiscussionForums have Multiple Valnerabilities : Access to Admin's Section and Persistent XSS. With this path you can easily access to Admin's section: http://Example.com/ManageSubject.aspx. Valnerable Code : DLL : App_Web_wngcbiby.dll, Class : Class adminlogin. In this application also there is a Persistent XSS exist in title field. Valnerable Code : DLL : App_Web_wngcbiby.dll, Class : Class AddPost

Mitigation:

Ensure that user input is properly sanitized and validated before being used in the application.
Source

Exploit-DB raw data:

'''
  __  __  ____         _    _ ____  
 |  \/  |/ __ \   /\  | |  | |  _ \ 
 | \  / | |  | | /  \ | |  | | |_) |
 | |\/| | |  | |/ /\ \| |  | |  _ < 
 | |  | | |__| / ____ \ |__| | |_) |
 |_|  |_|\____/_/    \_\____/|____/ 

http://www.exploit-db.com/moaub-14-freediscussionforums-multiple-remote-vulnerabilities/

'''


Abysssec Inc Public Advisory
 
 
  Title            :  FreeDiscussionForums Multiple Remote Vulnerabilities
  Affected Version :  Free Discussion Forum 1.0
  Discovery        :  www.abysssec.com
  Vendor	   :  http://www.freediscussionforums.net

  Download Links   :  http://sourceforge.net/projects/discusionforum/
  Admin Login      :  http://Example.com/adminlogin.aspx
 
Description :
===========================================================================================      
  This version of FreeDiscussionForums have Multiple Valnerabilities : 
        1- Access to Admin's Section
        2- Persistent XSS 


Access to Admin's Section:
===========================================================================================     
  With this path you can easily access to Admin's section:

        http://Example.com/ManageSubject.aspx  

  Valnerable Code :
      DLL   :  App_Web_wngcbiby.dll
      Class :  Class adminlogin
   
            protected void Button1_Click(object sender, EventArgs e)
	     {
               ...
               if ((this.txtUserName.Text.Trim() == str) && (this.txtPassword.Text.Trim() == str2))
                {
                  this.Session["User"] = "admin";
                  base.Response.Redirect("ManageSubject.aspx");
                }
	      }   



Persistent XSS:
=========================================================================================== 
 in this application also there is a Persistent XSS exist in title field.

   Valnerable Code :
      DLL   :  App_Web_wngcbiby.dll
      Class :  Class AddPost

             protected void Page_Load(object sender, EventArgs e)
	     {
		if (base.Request.QueryString["forumId"] != null)
		{
		    this.forumId = Convert.ToInt32(base.Request.QueryString["forumId"]);
		}
		if (base.Request.QueryString["title"] != null)
		{
		    this.title = Common.ReplaceString(base.Request.QueryString["title"].ToString().Trim());
		 }
		...
	     }  


===========================================================================================