Beehive Forum v1.4.4 Stored XSS Vulnerability
BGA Security Team discovered an Stored XSS vulnerability in Beehive Forum v1.4.4. The vulnerable inputs are 'Homepage URL', 'Picture URL' and 'Avatar URL' on Profile Section. Following line contain the vulnerability in edit_prefs.php; if (isset($_POST['homepage_url'])) { $user_prefs['HOMEPAGE_URL'] = trim($_POST['homepage_url']); $user_prefs_global['HOMEPAGE_URL'] = (isset($_POST['homepage_url_global'])) ? $_POST['homepage_url_global'] == 'Y' : true; if (strlen(trim($user_prefs['HOMEPAGE_URL'])) > 0) { if (preg_match('/^http:///u', $user_prefs['HOMEPAGE_URL']) < 1) { $error_msg_array[] = gettext('Homepage URL must include http:// schema.'); $valid = false; } else if (!user_check_pref('HOMEPAGE_URL', $user_prefs['HOMEPAGE_URL'])) { $error_msg_array[] = sprintf(gettext('%s is not a valid Homepage URL'), $user_prefs['HOMEPAGE_URL']); $valid = false; } } }