Aerosol Posted January 14, 2015 Report Posted January 14, 2015 WoltLab Burning Board 4.0 Tapatalk Cross Site ScriptingAdvisory: Cross-site Scripting in Tapatalk Plugin for WoltLab Burning Board 4.0RedTeam Pentesting discovered a cross-site scripting (XSS) vulnerabilityin the Tapatalk plugin for the WoltLab Burning Board forum software,which allows attackers to inject arbitrary JavaScript code via URLparameters.Details=======Product: Tapatalk Plugin com.tapatalk.wbb4 for WoltLab Burning Board 4.0Affected Versions: >= 1.0.0Fixed Versions: 1.1.2Vulnerability Type: Cross-Site ScriptingSecurity Risk: highVendor URL: https://tapatalk.comVendor Status: fixed version releasedAdvisory URL: https://www.redteam-pentesting.de/advisories/rt-sa-2014-015Advisory Status: publishedCVE: CVE-2014-8869CVE URL: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8869Introduction============"Tapatalk is an app built for interacting with discussion forums onmobile devices. It differs from a forum’s mobile web skin in that itoffers the speed of a native app and a streamlined unified interface forevery forum a user subscribes to. Tapatalk also creates a uniqueeco-system that allows forums to be searched and discovered by millionsof Tapatalk users which in turn promotes content, new memberships, andinteractions."(from Tapatalk's Homepage)More Details============The Tapatalk extension includes the PHP script welcome.php at the pathcom.tapatalk.wbb4/files/mobiquo/smartbanner/welcome.phpwhich is accessible via the URLhttp://www.example.com/mobiquo/smartbanner/welcome.phpon systems using the plugin. It outputs JavaScript code that includesimproperly encoded values from the two URL parameters "app_android_id"and "app_kindle_url". Depending on which parameters is used, one oftheir values is assigned to the PHP variable $byo:------------------------------------------------------------------------<?php[...]else if (isset($_GET['app_android_id'])){ $app_android_id = $_GET['app_android_id']; if ($app_android_id && $app_android_id != '-1') $byo = "&app_android_id=$app_android_id";}else if (isset($_GET['app_kindle_url'])){ $app_kindle_url = $_GET['app_kindle_url']; if ($app_kindle_url && $app_kindle_url != '-1') $byo = "&app_kindle_url=$app_kindle_url";}------------------------------------------------------------------------Later the $byo variable is used to build a URL without URL encoding itand the URL is used without further encoding in a script element:------------------------------------------------------------------------<?php[...]$ads_url = $protocol.'tapatalk.com/welcome_screen.php' .'?referer='.urlencode($referer) .'&code='.urlencode($code) .'&board_url='.urlencode($board_url) .'?='.urlencode($lang) .$byo .'&callback=?';[...]?>[...]<script>$.getJSON("<?php echo $ads_url; ?>",function(data){[...]------------------------------------------------------------------------Proof of Concept================The following URL can be used to demonstrate the vulnerability:http://www.example.com/mobiquo/smartbanner/welcome.php ?app_kindle_url=");alert('RedTeam Pentesting');</script><!--The result is a notification showing the text "RedTeam Pentesting".Workaround==========The PHP function urlencode() should be used to encode the $byo variablebefore building a URL with it.Fix===Update the plugin to version 1.1.2.Security Risk=============This security vulnerability is rated as a high risk. It allows toexecute arbitrary JavaScript code in users' browsers if they access URLsprepared by attackers. This provides many different possibilities forfurther attacks against these users. Since the plugin is used for abulletin board, the vulnerability could be exploited to display a fakelogin page and obtain credentials from users or administrators. Thevulnerability also affects other web applications hosted on the samedomain.Timeline========2014-10-20 Vulnerability identified2014-10-29 CVE number requested2014-11-14 CVE number assigned2014-11-26 Vendor notified via https://tapatalk.com/security.php2014-12-16 Vendor notified again, received reply from vendor2014-12-16 Vulnerability patched in SCM [0]2014-12-23 Updated plugin released by vendor [1]2015-01-08 Vendor updated release notes to mention XSS [2]2015-01-12 Advisory releasedReferences==========[0] https://github.com/tapatalk/tapatalk-wbb/commit/71024545904024cea9d04a887fdc64b9a9b85871[1] https://github.com/tapatalk/tapatalk-wbb/commit/31472f6fcfffacd698b0c20809c4a8fb3c4f32f9[2] https://support.tapatalk.com/threads/19540/#post-146253RedTeam Pentesting GmbH=======================RedTeam Pentesting offers individual penetration tests, short pentests,performed by a team of specialised IT-security experts. Hereby, securityweaknesses in company networks or products are uncovered and can befixed immediately.As there are only few experts in this field, RedTeam Pentesting wants toshare its knowledge and enhance the public knowledge with research insecurity-related areas. The results are made available as publicsecurity advisories.More information about RedTeam Pentesting can be found athttps://www.redteam-pentesting.de.-- RedTeam Pentesting GmbH Tel.: +49 241 510081-0Dennewartstr. 25-27 Fax : +49 241 510081-9952068 Aachen https://www.redteam-pentesting.deGermany Registergericht: Aachen HRB 14004Geschäftsführer: Patrick Hof, Jens LiebchenSourceWoltLab Burning Board 4.0 Tapatalk Open RedirectThe Tapatalk Plugin com.tapatalk.wbb4 for WoltLab Burning Board 4.0 prior toversion 1.1.2 allowed to redirect users to arbitrary URLs. This was possible byspecifying the target URL in the URL parameter board_url in URLs like thefollowing:http://www.example.com/mobiquo/smartbanner/welcome.php?board_url=https://www.redteam-pentesting.deCVE-2014-8870 was assigned to this issue.-- RedTeam Pentesting GmbH Tel.: +49 241 510081-0Dennewartstr. 25-27 Fax : +49 241 510081-9952068 Aachen https://www.redteam-pentesting.deGermany Registergericht: Aachen HRB 14004Geschäftsführer: Patrick Hof, Jens LiebchenSource Quote
Nytro Posted January 14, 2015 Report Posted January 14, 2015 Exact astea au fost raportate de persoane de pe forum pentru Talpashit pentru vBulletin 4. Astia sunt retardati. Quote