Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:11944
HistoryMar 25, 2006 - 12:00 a.m.

XSS in <= Toast Forums 1.6

2006-03-2500:00:00
vulners.com
7

XSS in <= Toast Forums 1.6

###############################################
Vuln. discovered by : r0t
Date: 25 march 2005
vendor:http://www.toastforums.com/
affected versions: 1.6 and prior
orginal advisory:
http://pridels.blogspot.com/2006/03/xss-in-toast-forums-16.html
###############################################

Vuln. Description.

Toast Forums contains a flaw that allows a remote cross site scripting
attack. This flaw exists because input passed to
"author","subject","message","dayprune" paremters isn't properly sanitised
before being returned to the user.
This could allow a user to create a specially crafted URL that would execute
arbitrary code in a user's browser within the trust relationship between the
browser and the server, leading to a loss of integrity.

/toast.asp?action=posts&sub=search&fid=
-1&author=[XSS]

/toast.asp?action=posts&sub=search&fid=
-1&author=r0t&subject=[XSS]

/toast.asp?action=posts&sub=search&fid=
-1&author=r0t&subject=&message=[XSS]

/toast.asp?action=posts&sub=search&fid=
-1&author=r0t&subject=&message=&dayprune=[XSS]
###############################################

Solution:
Edit the source code to ensure that input is properly sanitised.
###############################################
More information @ unsecured-systems.com/forum/