header-logo
Suggest Exploit
vendor:
Ikonboard
by:
SecurityFocus
7.5
CVSS
HIGH
Script Injection
79
CWE
Product Name: Ikonboard
Affected Version From: Older versions
Affected Version To: Ikonboard 3.1.1
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Unix and Linux variants
2002

Ikonboard Image Tag Script Injection Vulnerability

It is possible to inject arbitrary script code into forum messages via image tags. Script code will be executed in the browser of the user viewing the forum message, in the context of the website running the vulnerable software. This may allow an attacker to steal cookie-based authentication credentials.

Mitigation:

Ensure that user input is properly sanitized and filtered before being used in the application.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/4182/info

Ikonboard is a Web Bulletin Board Service (BBS) software package written in Perl which runs on Unix and Linux variants.

Ikonboard allows users to include images in forum messages using image tags, with the following syntax:

[img]url of image[/img]

It is possible to inject arbitrary script code into forum messages via these image tags. Script code will be executed in the browser of the user viewing the forum message, in the context of the website running the vulnerable software. This may allow an attacker to steal cookie-based authentication credentials.

Reports have indicated that this may be an issue in older versions.

It has also been reported that Ikonboard 3.1.1 is also vulnerable to this issue.

[img]javasCript:alert('Hello world.')[/img]
[IMG]javascript:alert(document.cookie).gif[/IMG]