A member reported a XSS vulnerability in stock JForum 2.1.9. We confirmed it was a vulnerability/exposure on CodeRanch as well and fixed our fork. Luckily, it was an easy fix unlike the CSRF problems last year.
In addition to saying how to fix the issue in this post, I’m going to outline some of the other techniques JForum uses to defeat XSS. For the actual (two character) fix, scroll down to “the fix.”
What is XSS?
XSS (Cross site scripting) is a security attack. OWASP describes in well on their XSS page. In brief, XSS injects code into a web page that runs on the target computer. The injected script code can do anything that the web page can do. Which means it can use JavaScript to steal your cookies, mount other attacks, etc. Scary stuff!
- Reflected XSS – A reflected XSS attack targets specific users but is not stored in the database of the server with the issue. You might see a reflected XSS attack if you click on a link that takes you to the page. Others going to the page normally wouldn’t see the issue.
- Persistent XSS – A persistent XSS attack gets the attack code stored in the database of the server with the issue. It could still target a specific user (in the case of the private message issue reported here.) Or it could target all users – even non logged in users – if the same attack was made in a post instead of a private message. I was able to reproduce this problem in posts as well.
Both types of XSS attack are bad and up to the website to prevent. So how does Jforum 2.1.X protect against XSS attacks?
Approach #1 – Use Freemarker HTML escape sequence
JForum uses Freemarker as the view technology. Freemarker allows you to specify that all HTML should be escaped. This means attacks that reply on outputting HTML characters like < (tags) or ” (attributes) will be prevented. Instead the raw characters of < and " will be output instead. Which the browser will not run. As an example of this technique, the code writes:
${post.subject?default("")?html}
Approach #2 – Escape characters in Java
Approach #1 is very powerful, but it has a limitation. Forum posts typically contain HTML code. For example, you write code in a special format, bold posts, etc. JForum uses Java code to do a search and replace on the special characters in text before adding the HTML formatting. Since the Freemarker view has to be able to render the HTML formatting, it can’t use approach #1. See an example of just one of these transformations:
ViewCommon.replaceAll(text, "<", "<");
This approach is not foolproof because it relies on a blacklist of “not allowed” characters and hackers are creative. But it is really hard to come up with a whitelist of allowed characters in forum posts. And worse, the characters used in attacks are ones that are used in normal writing.
Approach #3 – Limit raw HTML
While JForum does allow HTML in posts, it only allows a limited set of tags and attributes. This one does use a whitelist with code like:
private static Set welcomeTags; private static Set welcomeAttributes;
Approach #4 – Use BB code instead of HTML
The forum also allows use of BB (bulletin board) codes. This lets you write [b] instead of <b>. If the user isn’t entering HTML, the chance of a problem is lower.
The actual problem here
The XSS vulnerability reported was caused by the interaction between approach #2 and approach #4.
Approach #2 guarantees the quotes are safe with
ViewCommon.replaceAll(tmp, "\"", """);
Approach #4 contains the following BB mapping code in bb_config.xml
<!-- COLOR --> <match name="color" removeQuotes="true"> <regex>(?s)(?i)\[color=['"]?(.*?[^'"])['"]?\](.*?)\[/color\]</regex> <replace> <![CDATA[ <font color='$1'>$2</font> ]]> </replace> </match>
This is a problem because the replace uses single quotes instead of double quotes. The system doesn’t escape single quotes. Allowing all manners of code to be injected in the color attribute.
The fix
Luckily, there is an easy fix. Just change this one line of code in bb_config.xml to:
<font color="$1">$2</font>
I’ve tested and this does in fact solve the problem.
For more learning about XSS
If you want to learn more about XSS, I recommend reading the OWASP cheat sheet. In particular, notice that you need to escape the code differently depending on whether you are looking at HTML or JavaScript injection. In our case, it was HTML injection because the injection was occurring as a textual HTML attribute. If it was in <script> tag or JavaScript event handler, we’d need to call a JavaScript encoding library. Also, you can learn about DOM based XSS attacks.