As most of you should know, a part of
the cookie is a lie challenge consists of sending a PM to Z which he will click.
Well, one user, namely
hellsonic, managed to exploit the bbdecoder to automatize this task via XSS.
The flaw lied within the url parameter of the url tag, which was not sanitzed.
The problem got fixed in SVN with
changeset 2271.
Big thanks and gratulations to
hellsonic for finding this flaw.
Also thanks to Z for reporting the flaw
Happy Challenging!
gizmore