Threat Center Security News Vulnerability in WoltLab Burning Board
Vulnerability in WoltLab Burning Board Print E-mail
Written by Rebecca Mints   
Tuesday, 15 April 2008 18:00

A vulnerability in WoltLab Burning Board has been discovered by Jessica Hope. Successful exploitation of this error could result in the leakage of sensitive information and could also allow for susceptibility to XSS attacks. This vulnerability is exploited remotely and has been rated as "less critical."


The problem lies in the fact that input is not properly sanitized before returning an error message to the user. This input is passed via e.g. the "page" and "form" parameters to PHP files using the WoltLab Community Framework (WCF) to process requests, which allows for execution of arbitrary HTML as well as script code in a user's browser session. The installation path name is then disclosed. The vulnerability is reported in WCF version 1.0.6, included in WoltLab Burning Board 3.0.5. Other versions may also be affected. A solution to the problem would be to filter malicious characters and character sequences in a web proxy and to also restrict access to only trusted users.



REFERENCES:
SecuObs.com
WoltLab Burning Board WCF Error Printing Vulnerability

 

WTW Threat Level