Skip to content

Latest commit

 

History

History
26 lines (18 loc) · 1.69 KB

adminpanel.md

File metadata and controls

26 lines (18 loc) · 1.69 KB

FUDForum 3.0.9 - Stored XSS / Remote Code Execution [Admin Panel]

Greetz : wetw0rk, Fr13ndz, offsec

Description: FUDForum 3.0.9 is vulnerable to Stored XSS via the User-Agent HTTP header. This may result in remote code execution. An attacker can use a user account to fully compromise the system via a GET request. When the admin visits user information under "User Manager" in the control panel, the payload will execute. This will allow for PHP files to be written to the web root, and for code to execute on the remote server. The problem is in admsession.php and admuser.php.

Notes:

  1. Register an account and log in to the forum. If you have an IP already associated with a registered user this is not required. This step is so when you run the XSS payload from your attacker machine it gets logged under the user activity.

  2. Send the XSS payload below (from an IP associated with an account) / host the script:

  1. When the admin visits the user information from the admin controls / User Manager the payload will fire under "Recent sessions", uploading a php shell on the remote system.