Jump to content


Photo
- - - - -

Possible XSS Issue Addressed in IP.Board


This topic has been archived. This means that you cannot reply to this topic.
No replies to this topic

#1 IPS News

IPS News

    Public Relations

  • IPS Staff
  • 1,061 posts

Posted 26 April 2007 - 08:52 AM

Possible XSS Issue Addressed in IP.Board

It has come to our attention that a bug in Internet Explorer 6 and 7 can allow an XSS (cross-site scripting) attack by forcing uploaded image and PDF files to run as HTML which could allow an attack to run code through a user's browser. It should be noted that the XSS damage is significantly mitigated by the "HttpOnly" cookies which were introduced in IP.Board 2.2.0. This means that sensitive cookies in IP.Board 2.2.0 and higher cannot be read by JavaScript which could be crafted using this bug.

Although this is a significant flaw within Internet Explorer, we have made a work around to resolve this issue by scanning uploaded files for possible malicious code. If a file is found to contain code that should not exist, such as HTML or JavaScript in an image file, the upload will be denied.

The download packages for IP.Board as of this date have been updated to include the patch. To patch an existing installation of IP.Board 2.1.x or 2.2.x, download the appropriate patch file:

Version 2.1.x: Attached File  class_upload.php   12.37KB   4556 downloads

Version 2.2.x: Attached File  class_upload.php   13.05KB   6481 downloads

Simply upload the class_upload.php file for your appropriate version into the ips_kernel directory overwriting the existing file.