A famous advertising network for free/open-source software community, adbard.net, is currently vulnerable to
Ad network-wide Cross Site Scripting vulnerability. All its advertising networks
(http://adbard.net/adbard/websites) are vulnerable subsequently. Though the vulnerability is not tied to
ad network sites, how it can be leveraged depends only on skills and well-thought plans of attackers.
2. SITE SERVICE DESCRIPTION
The Ad Bard Network is the only advertising network designed specifically for reaching the developers,
architects, users and influencers in the free software community, allowing advertisers to directly
communicate with the key customers in this exciting new area.
3. VULNERABILITY DESCRIPTION
The serve.php at adbard.net is vulnerable to Cross Site Scripting vulnerability as the "u" parameter
is not properly sanitized. The serve.php is linked from Adbard.net's ad script
(currently, it is 'http://cdn1.adbard.net/js/ab1.js').
+ Cross Site Scripting (OWASP 2010 Top 10 - A2)
As the adbard.net has tons of ad publishers and advertisers, attackers can exploit this flaw for fun and profit.
Ad Bard Network
This vulnerability was discovered by Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.
8. DISCLOSURE TIME-LINE
08-10-2010: vulnerability discovered
08-13-2010: contacted adbard.net and its owner Tag1 consulting via their support email
08-17-2010: got reply that adbard.net's engineers were looking at the issue
08-18-2010: vulnerablity fixed
08-18-2010: still vulnerable to attribute-based XSS
08-18-2010: notified again
08-20-2010: vulnerablity fixed
Original Advisory URL: http://yehg.net/lab/pr0js/view.php/[adbard.net]_xss
OWASP Top 10 - http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project