Stored XSS in MyBB - Security Boulevard

SBN Stored XSS in MyBB

Exploitation Level: Easy/Remote

DREAD Score: 8.0

Vulnerability: Stored XSS

Patched Version: 1.8.21

MyBB recently published a new update, version 1.8.21. This is a security release fixing a Stored XSS vulnerability in the private messaging and post modules.

What Are the Risks?

Unpatched websites could allow bad actors to send booby-trapped posts or private messages to users. These would execute rogue JavaScript code when opened, momentarily giving the attacker’s scripts all privileges to the targeted account.

If administrators are targeted, successful attacks could trick their browser into hacking their own site by executing code on the server and grant full power over the site to the assailants.

Technical Details

As mentioned in the researchers advisory, the vulnerability specifically affects the bbcode. It allows other bbcodes, such as [url] to be embedded into the iFrame rendered by the video code, which corrupts its HTML attributes and allows malicious event handlers to be injected.

Furthermore, a database column truncation bug allowed administrators to store PHP backdoors on their site. While not as critical as it may first seem (administrators own their site), combining this bug with the XSS attack vector makes it possible for an attacker to trick the owner’s browser into taking over its own site, using the bad actor’s backdoor.

Update As Soon As Possible

Unauthenticated attacks are very serious because they can be automated, making it easy for hackers to mount successful, widespread attacks against vulnerable websites. The number of active installs, the ease of exploitation, and the effects of a successful attack are what makes this vulnerability particularly dangerous.

To protect against this vulnerability, we strongly encourage MyBB users to update their site to version 1.8.21 as soon as possible. Users that are unable to update immediately can leverage the Sucuri Firewall or equivalent technology to virtually patch the vulnerability.

*** This is a Security Bloggers Network syndicated blog from Sucuri Blog authored by Marc-Alexandre Montpas. Read the original post at: