source: http://www.securityfocus.com/bid/15924/info PHP Fusebox is prone to a cross-site scripting vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input. An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may facilitate the theft of cookie-based authentication credentials as well as other attacks. http://www.example.com/index.php?action=%3Ch1%3E%3Cmarquee%3Ehalooo%3C/marquee%3E%3C/h1%3E IndonesiaHack Advisory HTML injection in PHP Fusebox Author : Ph03n1X Email : king_purba@yahoo.co.uk Software Description Name : PHP Fusebox 4.0.6 Vendor : http://prdownloads.sourceforge.net/php-fusebox/FB3_PHP_b6.zip?download PoC : http://site.xxx/fusebox/index.php?fuseaction=
Vulnerable Code in file fbx_Fusebox3.0_PHP4.0.6.php : $FB_["rawFA"] = ($attributes["fuseaction"]); if(ListLen($FB_["rawFA"], ".") == 1 && substr($FB_["rawFA"], -1) == ".") { $Fusebox["fuseaction"] = "Fusebox.defaultFuseaction"; } Fix: $FB_["rawFA"] = htmlspecialchars($attributes["fuseaction"]); if(ListLen($FB_["rawFA"], ".") == 1 && substr($FB_["rawFA"], -1) == ".") { $Fusebox["fuseaction"] = "Fusebox.defaultFuseaction"; } Credit : Zhainal, No-p****le (Bole disebut gak namanya om), All crew IndonesiaHack @ dalnet Nanang SW, nighlogin