header-logo
Suggest Exploit
vendor:
Simple Machines Forum
by:
SimpleAudit team from elhacker.net
9.3
CVSS
HIGH
Remote PHP code-execution, Cross-site Scripting, Cross-site Request-Forgery, Information-Disclosure, Denial-of-Service
79, 79, 352, 200, 400
CWE
Product Name: Simple Machines Forum
Affected Version From: 1.1.10
Affected Version To: 2.0 RC2
Patch Exists: Yes
Related CWE: N/A
CPE: a:simplemachines:simple_machines_forum
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Web
2009

Simple Machines Forum Multiple Security Vulnerabilities

Simple Machines Forum is prone to multiple security vulnerabilities, including a remote PHP code-execution vulnerability, multiple cross-site scripting vulnerabilities, multiple cross-site request-forgery vulnerabilities, an information-disclosure vulnerability, and multiple denial-of-service vulnerabilities. Attackers can exploit these issues to execute arbitrary script code within the context of the webserver, perform unauthorized actions on behalf of legitimate users, compromise the affected application, steal cookie-based authentication credentials, obtain information that could aid in further attacks or cause denial-of-service conditions. An attacker can use a browser to exploit these issues. To exploit the cross-site scripting and cross-site request-forgery vulnerabilities, the attacker must entice an unsuspecting victim into following a malicious URI.

Mitigation:

Users should upgrade to the latest version of Simple Machines Forum. Additionally, users should be aware of the risks posed by malicious links and should not follow them.
Source

Exploit-DB raw data:

Simple Machines Forum is prone to multiple security vulnerabilities:

- A remote PHP code-execution vulnerability
- Multiple cross-site scripting vulnerabilities
- Multiple cross-site request-forgery vulnerabilities
- An information-disclosure vulnerability
- Multiple denial-of-service vulnerabilities

Attackers can exploit these issues to execute arbitrary script code within the context of the webserver, perform unauthorized actions on behalf of legitimate users, compromise the affected application, steal cookie-based authentication credentials, obtain information that could aid in further attacks or cause denial-of-service conditions.

Please note some of these issues may already be described in other BIDs. This BID will be updated if further analysis confirms this.

These issues affect Simple Machines Forum 2.0 RC2. Some of these issues also affect version 1.1.10. 

Bugtraq ID: 37182
Class: Unknown
CVE: 
Remote: Yes
Local: No
Published: Dec 02 2009 12:00AM
Updated: Dec 02 2009 12:00AM
Credit: SimpleAudit team from elhacker.net
Vulnerable: Simple Machines Simple Machines Forum 1.1.10
Simple Machines Simple Machines Forum 2.0 RC2


An attacker can use a browser to exploit these issues. To exploit the cross-site scripting and cross-site request-forgery vulnerabilities, the attacker must entice an unsuspecting victim into following a malicious URI.

The following example URIs are available:

For information-disclosure issue issue:
http://server/index.php?action=admin;area=logs;sa=errorlog;file=L2V0Yy9wYXNzd2Q==

For denial-of-service issue:
GET /.xml.html;sa=news;limit=999;type=rss HTTP/1.1

For denial-of-service issue (cookie):
Cookie: GLOBALS

For cross-site scripting issues:
http://server/index.php?action=admin;area=languages;sa=add;[token]
PoC: "><xss>

http://server/index.php?action=admin;area=theme;sa=settings;th=2;[token]
PoC: http://urlreal"><script>alert(1);</script>