|
|
GulfTech Computers strives to beat the price(s) of any other business around.
Check with us first as it just may save you some time and money. And who doesn't want to
save money? Please contact us with any questions or inquiries.
|
SubScan v1.2 Scans a domain for DNS records and SubDomains. Very stealthy, and can be used
to find many hosts not on the public netblock. A very interesting tool to say the least.
Works on both Nix and Windows based systems. Get it now!
Download SubScan v1.2
|
|
You can use the form below to search our site. Just enter the keyword or keywords to search.
|
|
 |
Multiple Vulnerabilities In Snitz Forums
|
June 16, 2022
|
Vendor |
: Snitz Communications |
URL |
:
http://www.snitz.com
|
Version |
: 3.4.0.3 && Older |
Risk |
: Multiple Vulnerabilities |
BID |
:
http://www.securityfocus.com/bid/7925
:
http://www.securityfocus.com/bid/7924
:
http://www.securityfocus.com/bid/7922
|
CVE |
:
CAN-2003-0492
:
CAN-2003-0493
:
CAN-2003-0494
|
Description:
Snitz Forums is a full-featured UBB-style ASP
discussion board application. New features in version 3.3:
Complete Topic/Post Moderation, Topic Archiving, Subscribe
to Board / Category / Forum / Topic, Improved unsubscribe,
Short(er) urls, Category and Forum ordering, and Improved
Members-page. And like always, upgrading of the database is
done for you by the setupscript
|
Search XSS Vulnerability:
Snitz search feature is vulnerable to XSS which
can aide an attacker in stealing cookies, and thus
compromising the account, as described below
search.asp?Search="><script>alert(document.cookie)</script>
|
Cookie Authentication Bypass Vulnerability:
In order to steal another users identity, all an attacker
needs to know is thier encrypted password. This is not
very hard to obtain using the XSS as described above, or
other methods. Once an attacker has this info, all they
have to do is login to thier normal account to get a valid
session id, close the browser, replace thier username and
encrypted pass with that of the victim, and return to the
site where they will be recognized as the victim.
|
Password Reset Vulnerability:
This is the most serious of the vulns, as it requries no
real effort and leaves the entire snitz forum open to attack.
All an attacker has to do is request a forgotten password, save
the password reset page offline,edit the member id to the desired
member id, and submit the form. The members password will then
be reset to that of the attackers choosing.
|
Solution:
Upgrade to version v3.4.04 or higher
|
Credits:
Credits go to JeiAr of the GulfTech Security Research Team.
|
|
|
|
|
|