[FIX] BoostCMS XSS Exploit Fix - News Comments [FIX]

Results 1 to 21 of 21
  1. #1
    Enthusiast ayril is offline
    MemberRank
    Dec 2010 Join Date
    41Posts

    ! [FIX] BoostCMS XSS Exploit Fix - News Comments [FIX]

    This is a patch to fix the XSS Exploit in BoostCMS News Comments. I've discovered this exploit by using a special web security check software, few months ago while I'm checking the CMS. I decided to release this patch to public as it may help few users who are currently searching for the fix.

    You may download the patch in the attachments below.

    BoostCMS Patch by Airilxx.zip

    Instructions: Put the patch in <your web server path>/Boost/Packages/Default/Templates/ . Please be remember, backup your original Comment.tpl and place somewhere else outside your server web folder

    Note: This patch is 100% created by me, I only changed few bits of codes

    real code
    Code:
    <?php echo str_replace("\n", '<br>', htmlspecialchars($Comment['comment'])); ?>
    replaced with
    Code:
    <?php echo strip_tags(str_replace("\n", '<br>', mysql_real_escape_string($Comment['comment']))) ?>
    Last edited by ayril; 06-03-15 at 06:37 AM. Reason: Code Snippets


  2. #2
    R.I.P Millercent FatalLulz is offline
    MemberRank
    Nov 2012 Join Date
    AustraliaLocation
    2,248Posts

    Re: [FIX] BoostCMS XSS Exploit Fix - News Comments [FIX]

    Why make it a download when you can just make a quick tutorial showing users what pieces of code to change.. Would it not be more logical doing such?

  3. #3
    Enthusiast ayril is offline
    MemberRank
    Dec 2010 Join Date
    41Posts

    Re: [FIX] BoostCMS XSS Exploit Fix - News Comments [FIX]

    Quote Originally Posted by FatalLulz View Post
    Why make it a download when you can just make a quick tutorial showing users what pieces of code to change.. Would it not be more logical doing such?
    I would do that, but I'm currently in lack of pc access. The attached files were directly compressed straight away from my vps server.

  4. #4
    Enthusiast Cliser is offline
    MemberRank
    Dec 2013 Join Date
    41Posts

    Re: [FIX] BoostCMS XSS Exploit Fix - News Comments [FIX]

    Quote Originally Posted by ayril View Post
    This is a patch to fix the XSS Exploit in BoostCMS News Comments. I've discovered this exploit by using a special web security check software, few months ago while I'm checking the CMS. I decided to release this patch to public as it may help few users who are currently searching for the fix.

    You may download the patch in the attachments below.

    BoostCMS Patch by Airilxx.zip

    Instructions: Put the patch in <your web server path>/Boost/Packages/Default/Templates/ . Please be remember, backup your original Comment.tpl and place somewhere else outside your server web folder

    Note: This patch is 100% created by me, I only changed few bits of codes
    Can you post some screens, please? Thanks :)

  5. #5
    Mr VPS - Cheap VPS Server NOC is offline
    MemberRank
    Sep 2011 Join Date
    Liverpool, UKLocation
    844Posts

    Re: [FIX] BoostCMS XSS Exploit Fix - News Comments [FIX]

    Thanks for this release, good to see the community spirit is here.

  6. #6
    "(still lacks brains)" NoBrain is offline
    MemberRank
    Sep 2011 Join Date
    United KingdomLocation
    2,658Posts

    Re: [FIX] BoostCMS XSS Exploit Fix - News Comments [FIX]

    Quote Originally Posted by Cliser View Post
    Can you post some screens, please? Thanks :)
    Pretty much nothing to screenshot, lol?

  7. #7
    Account Upgraded | Title Enabled! Luriflax is offline
    MemberRank
    Jul 2007 Join Date
    333Posts

    Re: [FIX] BoostCMS XSS Exploit Fix - News Comments [FIX]

    the only thing has been changed is within line 24 also @FatalLulz is correct, you should make us aware of what fixed this exploit in future releases

    real code
    Code:
    <?php echo str_replace("\n", '<br>', htmlspecialchars($Comment['comment'])); ?>
    replaced with
    Code:
    <?php echo strip_tags(str_replace("\n", '<br>', mysql_real_escape_string($Comment['comment']))) ?>

  8. #8
    No need of reading this Rush Retros is offline
    MemberRank
    Dec 2013 Join Date
    DenmarkLocation
    365Posts

    Re: [FIX] BoostCMS XSS Exploit Fix - News Comments [FIX]

    But the htmlspecialchars is the code that makes it non exploitable like u cant use specialchars or something lke that if i aint much wrong

  9. #9
    Enthusiast ayril is offline
    MemberRank
    Dec 2010 Join Date
    41Posts

    Re: [FIX] BoostCMS XSS Exploit Fix - News Comments [FIX]

    Quote Originally Posted by Rush Retros View Post
    But the htmlspecialchars is the code that makes it non exploitable like u cant use specialchars or something lke that if i aint much wrong
    Yes, its true, but in this case, the "exploiter" can input " < > ( ) " <- these tags secretly in comments to script a unique popup that displays unique codes, to steal users sessions, on the news page which had enabled comments. Well, you can replicate the XSS wth Acunetix Scanner if you want, just use the clean install of BoostCMS 2.0

  10. #10
    Enthusiast ayril is offline
    MemberRank
    Dec 2010 Join Date
    41Posts

    Re: [FIX] BoostCMS XSS Exploit Fix - News Comments [FIX]

    Quote Originally Posted by psykoo View Post
    the only thing has been changed is within line 24 also @FatalLulz is correct, you should make us aware of what fixed this exploit in future releases

    real code
    Code:
    <?php echo str_replace("\n", '<br>', htmlspecialchars($Comment['comment'])); ?>
    replaced with
    Code:
    <?php echo strip_tags(str_replace("\n", '<br>', mysql_real_escape_string($Comment['comment']))) ?>
    Alrite, Noted [FIX] BoostCMS XSS Exploit Fix - News Comments [FIX] I'll update this thread with the code snippets soon.

  11. #11
    Enthusiast ayril is offline
    MemberRank
    Dec 2010 Join Date
    41Posts

    Re: [FIX] BoostCMS XSS Exploit Fix - News Comments [FIX]

    Quote Originally Posted by Johno View Post
    Thanks for this release, good to see the community spirit is here.
    Most welcome :) I decided to release here as I saw some peoples, esp. my mates, were able to fix these problems, but they won't share the codes on public. [FIX] BoostCMS XSS Exploit Fix - News Comments [FIX]

  12. #12
    Enthusiast ayril is offline
    MemberRank
    Dec 2010 Join Date
    41Posts

    Re: [FIX] BoostCMS XSS Exploit Fix - News Comments [FIX]

    Quote Originally Posted by Cliser View Post
    Can you post some screens, please? Thanks :)
    Sorry but I can't provide any screenshots, since its only contains php snippets [FIX] BoostCMS XSS Exploit Fix - News Comments [FIX]

  13. #13
    Developer BurakDev is offline
    MemberRank
    Mar 2013 Join Date
    ParisLocation
    376Posts

    Re: [FIX] BoostCMS XSS Exploit Fix - News Comments [FIX]

    You can exploit htmlspecialchars ? Explain me how can you get the cookies

  14. #14
    "(still lacks brains)" NoBrain is offline
    MemberRank
    Sep 2011 Join Date
    United KingdomLocation
    2,658Posts

    Re: [FIX] BoostCMS XSS Exploit Fix - News Comments [FIX]

    Quote Originally Posted by BurakDev View Post
    You can exploit htmlspecialchars ? Explain me how can you get the cookies
    htmlentities would be better to use than htmlspecialchars.

  15. #15
    Developer BurakDev is offline
    MemberRank
    Mar 2013 Join Date
    ParisLocation
    376Posts

    Re: [FIX] BoostCMS XSS Exploit Fix - News Comments [FIX]

    Quote Originally Posted by ησвяαιη View Post
    htmlentities would be better to use than htmlspecialchars.
    Yes I know but if I remember you can only execute simple javascript code on htmlspecialchars, you can't get cookie

  16. #16
    Enthusiast ayril is offline
    MemberRank
    Dec 2010 Join Date
    41Posts

    Re: [FIX] BoostCMS XSS Exploit Fix - News Comments [FIX]

    Quote Originally Posted by BurakDev View Post
    Yes I know but if I remember you can only execute simple javascript code on htmlspecialchars, you can't get cookie
    Well, if u refused to trust me, you can replicate it by using acunetix web scanner. I dont want to quarrel over these things on my thread. I released this to help some people who want get rid of such problems.

  17. #17
    [FIX] BoostCMS XSS Exploit Fix - News Comments [FIX][FIX] BoostCMS XSS Exploit Fix - News Comments [FIX] pel is offline
    MemberRank
    Jan 2012 Join Date
    Munich, GermanyLocation
    384Posts

    Re: [FIX] BoostCMS XSS Exploit Fix - News Comments [FIX]

    mysql_real_escape_string !? wtf, why mysql_real_escape_string ?!?!?!?

  18. #18
    "(still lacks brains)" NoBrain is offline
    MemberRank
    Sep 2011 Join Date
    United KingdomLocation
    2,658Posts

    Re: [FIX] BoostCMS XSS Exploit Fix - News Comments [FIX]

    Quote Originally Posted by iExit View Post
    mysql_real_escape_string !? wtf, why mysql_real_escape_string ?!?!?!?
    It's also deprecated.

  19. #19
    Enthusiast ayril is offline
    MemberRank
    Dec 2010 Join Date
    41Posts

    Re: [FIX] BoostCMS XSS Exploit Fix - News Comments [FIX]

    Well then, change the strings to other if it doesn't suitable.
    I use references from web to fix these exploits, so the variables that i've use might be outdated.

  20. #20
    Gaby is offline
    MemberRank
    Apr 2013 Join Date
    Viva HollandiaLocation
    1,607Posts

    Re: [FIX] BoostCMS XSS Exploit Fix - News Comments [FIX]

    Real_escape_string is not meant for output from the database, only for input into the database.

  21. #21
    Enthusiast ayril is offline
    MemberRank
    Dec 2010 Join Date
    41Posts

    Re: [FIX] BoostCMS XSS Exploit Fix - News Comments [FIX]

    Well, if I remove the string, will it able to block sessions stealing?



Advertisement