header-logo
Suggest Exploit
vendor:
Simple Machines Forum (SMF)
by:
Unknown
7.5
CVSS
HIGH
HTML Injection
79
CWE
Product Name: Simple Machines Forum (SMF)
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: NO
Related CWE:
CPE: a:simplemachines:forum
Metasploit:
Other Scripts:
Platforms Tested: Unknown
Unknown

HTML Injection Vulnerability in Simple Machines Forum (SMF)

The vulnerability allows an attacker to execute arbitrary HTML or script code in a user's browser by injecting malicious content via the font size attribute. This can lead to theft of cookie-based authentication credentials and other potential attacks.

Mitigation:

It is recommended to update to the latest version of Simple Machines Forum (SMF) to prevent this vulnerability. Additionally, input sanitization should be implemented to filter out potentially malicious content.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/10281/info

It has been reported that Simple Machines Forum (SMF) may be prone to an HTML injection vulnerability that may allow an attacker to execute arbitrary HTML or script code in a user's browser. The issue exists due to insufficient sanitization of user-supplied input via the font size attribute.

Exploitation could allow for theft of cookie-based authentication credentials. Other attacks are also possible.

An attacker could reportedly post content to the forums containing:

[size=expression(alert(document.cookie))]Content[/size]

With the limit that the forum software filters out quotes, apostrophes and semicolons.

Another method that circumvents the software filtering would be to post content such as:

[size=expression(eval(unescape(document.URL.substring(document.URL.length-34,document.URL.length))))]Content[/size]

then get the victim to follow:

http://www.example.com/index.php?topic=12345.0&alert('cookie:\n'+document.cookie)

Where the '12345.0' is the topic containing the previously posted content. The victim's browser would execute the last 34 characters (as specified in the previously posted 'length-34' content).