header-logo
Suggest Exploit
vendor:
LayerBB
by:
0xB9
7.5
CVSS
HIGH
Cross-Site Scripting
79
CWE
Product Name: LayerBB
Affected Version From: 1.1.2
Affected Version To: 1.1.2
Patch Exists: YES
Related CWE: CVE-2019-7688
CPE: a:layerbb:layerbb:1.1.2
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Ubuntu 18.04
2018

LayerBB 1.1.2 – Cross-Site Scripting

LayerBB is a free open-source forum software. The 2 XSS's found allows users to input a payload to Custom Profile Fields and the polls question & answers input via a new thread. Proof of Concept: PoC - Polls QnA: Start a new thread and use a payload in the polls QnA input boxes <script>alert('XSS')</script>. PoC - Custom Profile Fields: Create a Custom Profile Field in ACP, then use an account from any usergroup & edit profile, input a payload in the bottom 'Additional Profile Fields' textbox <script>alert('XSS')</script>.

Mitigation:

Update to 1.1.3
Source

Exploit-DB raw data:

# Exploit Title: LayerBB 1.1.2 - Cross-Site Scripting
# Date: 11/19/2018
# Author: 0xB9
# Twitter: @0xB9Sec
# Contact: 0xB9[at]pm.me
# Software Link: https://forum.layerbb.com/downloads.php?view=file&id=28
# Version: 1.1.2
# Tested on: Ubuntu 18.04
# CVE: CVE-2019-7688


1. Description:
LayerBB is a free open-source forum software. The 2 XSS's found allows users to input a payload to Custom Profile Fields and the polls question & answers input via a new thread.


2. Proof of Concept:

PoC - Polls QnA
- Start a new thread
- Use a payload in the polls QnA input boxes  <script>alert('XSS')</script>
- Anyone who views the thread will execute payload

PoC - Custom Profile Fields
- Create a Custom Profile Field in ACP
- Then use an account from any usergroup & edit profile
- Input a payload in the bottom "Additional Profile Fields" textbox  <script>alert('XSS')</script>
- Anyone who views your profile will execute payload



3. Solution:
Update to 1.1.3