Nytro Posted December 3, 2015 Report Posted December 3, 2015 [h=1]IP.Board 4.1.4.x - Persistent XSS Vulnerability[/h]# Exploit Title: IP.Board Persistent XSS Vulnerability# Date: 29/10/2015# Software Link: https://www.invisionpower.com/buy# Software version : 4.1.4.x# Exploit Author: Mehdi Alouache# Contact: mehdi.alouache@etu.univ-lehavre.fr# Category: webapps1. DescriptionAny registered user can execute remote javascript code by sending a private message to another user. The malicious JS code has tobe written in the title of the message, and the receiver must have enabled the notifications when a new message is delivered.Note that the code will be directly executed as soon as the notification appear. (The receiver doesn't even need to check hisinbox).2. Proof of ConceptRegister on the forum (IP.Board) of a website as a regular user, and send a message to any user having the message notificationsenabled. In the title field (and only here), a simple <script>alert(1)</script> will show a dialog box to the victim.3. Solution:Patch the vulnerability with the (incoming) associated patch.-- ALOUACHE MehdiDepartement informatiqueGroupe Amehdi.alouache@hotmail.frmehdi.alouache@etu.univ-lehavre.frSursa: https://www.exploit-db.com/exploits/38837/ 1 Quote
Speed123 Posted May 13, 2016 Report Posted May 13, 2016 Lol , nu-mi vine sa cred ca la finele anului 2015 IPboard suferea de o vulnerabilitate XSS de copilasi indieni . Sa-mi bag pula , schimba-ti platforma 1 Quote