Bugtraq mailing list archives
Snitz 2000 Code Patch (was RE: Open Bulletin Board javascript bug.)
From: Joshua_Hiller () aeanet org
Date: Wed, 27 Feb 2002 21:46:36 -0800
The fix listed below is functional, but the vendor of this product has released a much better version posted at http://forum.snitz.com/forum/link.asp?TOPIC_ID=23660 Please use the above version, as it uses the replace function properly (I was in a hurry), takes care of more characters, and is the vendor approved patch. I am -=not=- the vendor for this product, I just think it's an excellent application, and have used it a great deal. (The fact that it's free is like a total bonus ;) ) The website for this application can be found at http://www.snitz.com or http://forum.snitz.com (Forum site) . I posted the fix because I wanted administrators to be able to resolve this problem as quickly as possible. :) Josh -=-=-=FORWARDED MESSAGE
'##### Quick Bug fix for Javascript in [img] tags - Joshua Hiller 02.27.02
#####
strUrlText = replace(LCase(strUrlText),"javascript",
"")
'##### End Quick Bug fix for Javascript in [img] tags - Joshua Hiller
02.27.02 #####
"Justin" <jwgolihew@cs.miller To:
<bugtraq () securityfocus org>
sville.edu> cc: Subject: RE: Open
Bulletin Board javascript bug.
02/26/02 06:05 PM Snitz Forums 2000, another free bulletin board software is also
vulnerable.
-----Original Message----- From: godminus [mailto:godminus () owns com] Sent: Tuesday, February 26, 2002 1:24 PM To: bugtraq () securityfocus org Subject: Re: Open Bulletin Board javascript bug.OpenBB is free php-based forum. Exploit: [img]javasCript:alert('Hello world.')[/img] Vulnerable systems: All versions of Open Bulletin Board including v.1.0.0 Immune systems: None Solution: All url's in [img] tags should start with "http://" Yurij RumiantsevIkonboard version 3.0.1 is vulnerable for the same bug -- godminus
Current thread:
- Snitz 2000 Code Patch (was RE: Open Bulletin Board javascript bug.) Joshua_Hiller (Feb 28)