|
Family: CGI abuses --> Category: attack
vBulletin Email Field Cross-Site Scripting Vulnerability Vulnerability Scan
Vulnerability Scan Summary Checks version number of vBulletin
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote web server contains a PHP application that is affected by a
cross-site scripting issue.
Description :
According to its banner, the version of vBulletin installed on the
remote host does not properly sanitize user-supplied input to the
email field in the 'profile.php' script. Using a specially-crafted
email address in his profile, an authenticated attacker can leverage
this issue to inject arbitrary HTML and script code into the browsers
of users who views the attacker's profile.
See also :
http://www.securityfocus.com/archive/1/426537/30/0/threaded
http://www.vbulletin.com/forum/showthread.php?t=176170
Solution :
Upgrade to vBulletin 3.5.4 or later.
Threat Level:
Low / CVSS Base Score : 2.3
(AV:R/AC:L/Au:NR/C:P/I:N/A:N/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|