Snitz 2000 Code Patch (was RE: Open Bulletin Board javascript bug.)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



The fix listed below is functional, but the vendor of this product has
released a
much better version posted at
http://forum.snitz.com/forum/link.asp?TOPIC_ID=23660

Please use the above version, as it uses the replace function properly (I
was in a hurry), takes care of
more characters, and is the vendor approved patch.

I am -=not=- the vendor for this product, I just think it's an excellent
application, and have used it a great deal.
(The fact that it's free is like a total bonus ;) )  The website for this
application can be found at
http://www.snitz.com or http://forum.snitz.com (Forum site) .

I posted the fix because I wanted administrators to be able to resolve this
problem as quickly as possible. :)

Josh





-=-=-=FORWARDED MESSAGE

>'##### Quick Bug fix for Javascript in [img] tags - Joshua Hiller 02.27.02
#####
>                   strUrlText = replace(LCase(strUrlText),"javascript",
"")
>'##### End Quick Bug fix for Javascript in [img] tags - Joshua Hiller
02.27.02 #####
>
>
>
>
>
>                      "Justin"
>                      <jwgolihew@cs.miller        To:
<bugtraq@securityfocus.org>
>                      sville.edu>                 cc:
>                                                  Subject:  RE: Open
Bulletin Board javascript bug.
>                      02/26/02 06:05 PM
>
>
>
>
>
>
>Snitz Forums 2000, another free bulletin board software is also
vulnerable.
>
>-----Original Message-----
>From: godminus [mailto:godminus@owns.com]
>Sent: Tuesday, February 26, 2002 1:24 PM
>To: bugtraq@securityfocus.org
>Subject: Re: Open Bulletin Board javascript bug.
>
>
>>   OpenBB is free php-based forum.
>>
>>   Exploit:
>>   [img]javasCript:alert('Hello world.')[/img]
>>
>>   Vulnerable systems:
>>   All versions of Open Bulletin Board including
>>   v.1.0.0
>>
>>  Immune systems:
>>   None
>>
>>   Solution:
>>   All url's in [img] tags should start
>>   with "http://";
>>
>>                                    Yurij Rumiantsev
>
>Ikonboard version 3.0.1 is vulnerable for the same bug
>
> -- godminus
>
>
>
>
>







[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux