| VID |
21430 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The YaBB has an 'YaBB.pl' script Cross-site Scripting Vulnerability. YaBB is an open-source Bulletin Board system which runs on any system capable of executing Perl CGI scripts. YaBB version 1 GOLD SP 1.3.2 and possibly other versions are vulnerable to cross-site scripting vulnerability, caused by a failure of the application to properly validate user-supplied input in the 'YaBB.pl' script. A remote attacker could create a specially crafted URL link to the 'YaBB.pl' script containing malicious script code, and then could persuade a target user to click it. Once the URL is clicked, the embedded codes would be executed in the victim's Web browser. A remote attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.
* References: http://secunia.com/advisories/12593/
* Platforms Affected: YaBB 1 GOLD SP 1.3.2 Any operating system Any version |
| Recommendation |
No upgrade or patch available as of June 2014.
Upgrade to the new version of YABB, when new version fixed this problem becomes available from the YABB Web Site at http://www.yabbforum.com/ |
| Related URL |
CVE-2004-2402 (CVE) |
| Related URL |
11215 (SecurityFocus) |
| Related URL |
17452 (ISS) |
|