header-logo
Suggest Exploit
vendor:
Phorum
by:
SecurityFocus
4.3
CVSS
MEDIUM
Cross-Site Scripting (XSS)
79
CWE
Product Name: Phorum
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: UNIX variants, Linux, and Microsoft Windows
2002

Phorum GLOBALS Parameter XSS Vulnerability

Phorum is a PHP based web forums package designed for most UNIX variants, Linux, and Microsoft Windows operating systems. The 'header.php' and 'footer.php' components of Phorum do not santize the client-supplied value of the 'GLOBALS' parameter prior to output. As a result, script commands embedded in these variables will be executed by the client in the context of Phorum. Attackers may exploit this vulnerability to obtain user credentials.

Mitigation:

Input validation should be used to ensure that user-supplied data is properly sanitized.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/4767/info

Phorum is a PHP based web forums package designed for most UNIX variants, Linux, and Microsoft Windows operating systems.

The 'header.php' and 'footer.php' components of Phorum do not santize the client-supplied value of the 'GLOBALS' parameter prior to output. As a result, script commands embedded in these variables will be executed by the client in the context of Phorum.

Attackers may exploit this vulnerability to obtain user credentials.

http://[host]/phorum/admin/footer.php?GLOBALS[message]=<script>alert("css strikes!");</script>

http://[host]/phorum/admin/header.php?GLOBALS[message]=<script>alert("css strikes!");</script>