← Advisories

FluxBB 1.5.3 Multiple Remote Vulnerabilities

Medium
Advisory ID
ZSL-2013-5150
Release Date
29 July 2013
Vendor
Affected Version
1.5.3
CVE
N/A
Tested On
Microsoft Windows 7 Ultimate SP1 (EN), Apache 2.4.2 (Win32), PHP 5.4.7, MySQL 5.5.25a
Summary

FluxBB is fast, light, user-friendly forum software for your website.

Description

FluxBB suffers from a cross-site scripting, cross-site request forgery and URL redirect vulnerability. The application allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site. Input passed via the 'redirect_url' parameter in 'misc.php' script is not properly verified before being used to redirect users. This can be exploited to redirect a user to an arbitrary website e.g. when a user clicks a specially crafted link to the affected script hosted on a trusted domain. It also fails to properly sanitize user-supplied input to the 'form[board_title]' POST parameter in the 'admin_options.php' script. Attackers can exploit this weakness to execute arbitrary HTML and script code in a user's browser session.

Proof of Concept
Disclosure Timeline
14.08.2013Vendor releases versions 1.5.4 and 1.4.11 to fix these issues.
Credits
Vulnerability discovered by Gjoko Krstic
References
Changelog
29.07.2013Initial release
30.07.2013Added reference [2], [3], [4], [5], [6], [7] and [8]
01.08.2013Added reference [9] and [10]
14.08.2013Added vendor status and reference [11] and [12]
15.11.2013Added reference [13]