Post possibly corrupted this forum

I just received this message from BizWiz about how he has been hacked.  He believes something he posted here might have damaged this forum.  As requested, I have contacted Boonex support, but if anyone has them on an IM please also contact them so they know right away.

--------------------

My site was hacked. The exploit is documented here.


http://milw0rm.com/exploits/7931

I tried to search for it, but there was no mention on Dolphin forums.

I attempted to put the code problem in the Dolphin Forum at Boonex, and apparently caused a problem.

Please contact the engineering people at boonex and have them delete my last entry in the dolphin forums.

The content that cause the problem is an exploit. I have added the hypens in the critical script line below.

First you must login then write new topic
write in the topic
-"->-<-s-c-r-i-p-t->-a-l-e-r-t-(-d-o-c-u-m-e-n-t-.-c-o-o-k-i-e-)-<-/-s-c-r-i-p-t>-



demo: http://www.demozzz.com/orca/demo/?action=goto&topic_id=test--2009-01-30#topic/-script-alert-document-cookie-script-.htm

Quote · 15 Feb 2009

Update - Arthur says all they have to do to fix this is delete the corrupted post.

Quote · 15 Feb 2009

Hahahaha, I'm laughing for two reasons:

 

1. All that code does is pop up a box that shows the user their cookie, no one else can see it but them so it doesn't hurt anything.

 

BUT

 

2. If it worked and the box popped up when you looked at his post that means boonex.com is vulnerable to XSS (cross site scripting) and it COULD be used for something that is dangerous.

 

All those updates to Dolphin to fix the security problems and their own forum still had a hole.. I mean IF the box actually popped up, I didn't see his post.

Quote · 15 Feb 2009

Wen i clicked his post, the only thing what was happening, that the body of the forum was going down under the menu.

Kids first
Quote · 15 Feb 2009

The post that I put up, has caused a corruption of the entire thread.  Until Boonex remove that entry, it will remain corrupt.

Don't take my word for it. Search google for the key word and you can read the hack.

It is not a trivial hack. Running any kind of script through a form is a serious hole.

Thank you all.

Arthur

Quote · 15 Feb 2009

killerhaai, buckmcgoo, and others. You will find the exploit detailed here.

http://milw0rm.com/exploits/7931

The mistake I made was to copy the content of that exploit into the dolphin forum tinymce text area.  This caused the entire 6.1 and other forums to disappear completely. 

So...be careful

Arthur

Quote · 15 Feb 2009

Boonex apparently knew of this problem.  Here is code from an unaltered file in Dolphin inc/classes/BxDolGroups.php

// Ma-an it is crazy. I don't know what they'll enter in search form =)
// Our testers entered <script>alert(1)</script> it has broken everything
function unbreak_js( $sText ) {
return str_replace( '</script>', "</scr'+'ipt>", $sText );
}


Once they remove my post with the <script>alert code, the forum will be fine, BUT they need to fix this quickly.

Arthur

Quote · 15 Feb 2009

If the box didn't pop up and show you the contents of your boonex cookie then the exploit won't work here... they just have their xss "cleaner" set up wrong so that the page is broken if you try and insert a script. If you put that code somewhere and the box actually pops up then that site is running any code that is inserted into an input, which is a BAD thing.

Quote · 16 Feb 2009

Can someone please tell us, where in the dolphin form posts code, preferably universally, we can add a filter that will prevent adding a -<-s-c-r-i-p-t>- of any type?

Arthur

Quote · 16 Feb 2009

To get rid of this problem replace the following code in inc/util.inc.php file:


function prepare_to_db(&$s, $iAllowHTML = 1)
{
if ($iAllowHTML)
cleanPost($s);
}

to this:


function prepare_to_db(&$s, $iAllowHTML = 1)
{
if ($iAllowHTML)
cleanPost($s);
else
$s = strip_tags($s);
}

Rules → http://www.boonex.com/terms
Quote · 16 Feb 2009

Thank you SO much AlexT and Sammie for the soluition code to prevent this exploit.

I apologize to all of you for cutting and pasting the malicious code into the forum.  I just didn't think that it would have the effect it did.  I was just trying to make the problem known, and see if someone had a way to block the hole.

Thanks to all of you for you help.

One other useful piece of information.  My first line of defense was to delete the malicious user, thinking that the forum that the user was attached to would also be deleted.   It was not.  This is a flaw I think.

Here is what needs to be done in mysql to get rid of the actual code with a script in it:

SELECT post_id, post_text FROM pre_forum_post WHERE post_text LIKE '%<script%' AND user='THE USER NICKNAME';   Once you  have identified the the unique entries in mysql, DELETE that entry in order to fix the forum.

Arthur

Quote · 16 Feb 2009

Is anyone at Boonex going to fix the database for this Forum.  I am unable to review My Topics for any of the Forums.

.

.

Here is what needs to be done in mysql to get rid of the actual code with a script in it:

SELECT post_id, post_text FROM pre_forum_post WHERE post_text LIKE '%<script%' AND user='THE USER NICKNAME';   Once you  have identified the the unique entries in mysql, DELETE that entry in order to fix the forum.

Arthur

Quote · 16 Feb 2009

praveenkv1988 advises that this is an XSS attack.

I just read this....  http://ha.ckers.org/xss.html  Suggest my dolphin friends do the same.

http://shiflett.org/blog/2005/dec/google-xss-example

http://www.securecomputing.com/SWAT/SWAT_web2.0ex.html

It should also be noted that a security researcher recently uncovered 40 flaws in Google’s YouTube Web site. The vast majority of these flaws were XSS issues that put users at risk of having their profiles infected with a fast-spreading worm that could potentially steal users’ credentials.

Arthur

Quote · 17 Feb 2009
 
 
Below is the legacy version of the Boonex site, maintained for Dolphin.Pro 7.x support.
The new Dolphin solution is powered by UNA Community Management System.