Document Title:
PHPwind v9.1.0 - Multiple Cross Site Scripting Vulnerabilities

References (Source):


Release Date:

Vulnerability Laboratory ID (VL-ID):

Common Vulnerability Scoring System:

Vulnerability Class:
Cross Site Scripting - Non Persistent

Current Estimated Price:
500€ - 1.000€

Product & Service Introduction:
PHPWind is a forum program based on PHP and MySQL and one of the most frequently used forum programs. 
It is a forum program developed by Hangzhou Detian Information Technology Co, Ltd, China. The predecessor 
of PHPWind is ofstar. The source code for PHPWind can be downloaded for free, but it is not free software because the 
license does not meet the definition of free software.

(COp of the Homepage: )

Abstract Advisory Information:
An independent vulnerability laboratory researcher discovered multiple cross site scripting vulnerabilities in the PhpWind v9.1.0 forum software application.

Vulnerability Disclosure Timeline:
2019-06-20: Researcher Notification & Coordination (Security Researcher)
2019-06-21: Vendor Notification (Security Department)
2019-**-**: Vendor Response/Feedback (Security Department)
2019-**-**: Vendor Fix/Patch (Service Developer Team)
2019-**-**: Security Acknowledgements  (Security Department)
2019-07-04: Public Disclosure (Vulnerability Laboratory)

Discovery Status:

Exploitation Technique:

Severity Level:

Authentication Type:
No authentication (guest)

User Interaction:
Low User Interaction

Disclosure Type:
Coordinated Disclosure

Technical Details & Description:
Multiple non-persistent cross site scripting vulnerabilities has been discovered in the PhpWind v9.1.0 forum software application.
The cross site vulnerability allows remote attacker to manipulate client-side browser requests to compromise content or session data.

The cross site scripting vulnerabilities are located in the `c`, and `m` parameters of the `index,php` file. Remote attackers are 
able to inject own malicious script code (exp. javascript) to hijack user session credentials or to manipulate client-side the 
web-application contents in local browsers. The injection point of the vulnerabilities are the vulnerable `c` and `m` parameters. 
The attack vector is located on the application-side and the request method to inject/execute is GET. 

The security risk of the non-persistent cross site scripting web vulnerabilities are estimated as medium with a cvss count of 3.3.
Exploitation of the web security vulnerability requires a privileged web-application user account and only low user interaction. 
Successful exploitation of the client-side vulnerability results in session hijacking, non-persistent phishing, non-persistent 
external redirects and non-persistent manipulation affected or connected module context.

Request Method(s):
[+] GET

Vulnerable File(s):
[+] index.php

Vulnerable Parameter(s):
[+] c
[+] m

Proof of Concept (PoC):
The client-side vulnerability can be exploited by remote attackers and local low privileged application user account with low or medium user interaction.
For security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue.

Powered by phpwind v9.0 ©2003-2103

Example: PoC
http://localhost:8080/index.php?c=attachaeejn[XSS PAYLOAD]Eromv2&a=delete&_json=1

http://localhost:8080/index.php?c=postu0rtp[XSS PAYLOAD]elgkz2uswpta&a=doadd&_json=1&fid=2
&atc_title=ouioyiuhiwaewe&atc_content=waewaea&pid=&tid=[XSS PAYLOAD]&special=default&reply_notice=1&csrf_token=

http://localhost:8080/index.php?m=emotioneekt9[XSS PAYLOAD]jkggr&type=bbs&&_json=1

Exploitation: PoC




Solution - Fix & Patch:
The issue can be fixed if proper input validation will be taken in place for the c and m parameters in the index.php file.

Security Risk:
The security risk of the cross site scripting web vulnerabilities in the phpwind web-application are estimated as medium.

Credits & Authors:
Vibhuti Nath

Disclaimer & Information:
The information provided in this advisory is provided as it is without any warranty. Vulnerability Lab disclaims all warranties, 
either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-Lab 
or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits 
or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do 
not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. 
We do not approve or encourage anybody to break any licenses, policies, deface websites, hack into databases or trade with stolen data.


Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. 
Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other 
media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and other 
information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list, modify, use or 
edit our material contact (admin@ or research@) to get a ask permission.

				    Copyright © 2019 | Vulnerability Laboratory - [Evolution Security GmbH]™