The Arcive of Official vBulletin Modifications Site.It is not a VB3 engine, just a parsed copy! |
|
#1
|
|||
|
|||
![]()
vBulletin stores two cookies - a hashed password and my user ID. If someone steals these two cookies from me (i.e. if my cookies were stolen via an XSS flaw in the vB installation), would they be able to cleanly authenticate into my user account?
|
#2
|
|||
|
|||
![]()
No.
Though anything is possible |
#3
|
|||
|
|||
![]()
Considering a lot of the forum requires reauthentication - no.
The cookie is hashed using your cookie ID as well as your password and salt, triple hash whereas the database is a double hash. |
#4
|
|||
|
|||
![]() Quote:
Try this: 1) Login to vbulletin.org 2) Delete the cookies highlighted below: ![]() 3) Close your browser completely (ending any authentication sessions) 4) Visit vbulletin.org 5) You are re-authenticated So, surely this means that vBulletin is reauthenticating you based on your hashed password value (it doesn't matter how it is hashed) and your user ID. This means that should vbulletin.org be attacked via an XSS flaw, an attacker could load an iframe on vbulletin.org of a malicious website and steal my cookie, using it to cleanly authenticate. Are my assumptions here correct? |
#5
|
|||
|
|||
![]()
I've tested this, and it looks like by taking the cookie information, anyone can authenticate as you. Whether or not the password is hashed is irrelevant and ultimately futile against XSS attacks
![]() |
![]() |
|
|
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
![]() |
|
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|