| VID |
21432 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The PunBB, according to its version number, has a cross-site scripting vulnerability via the IMG tag. PunBB is a freely available, open source PHP-based bulletin board software. PunBB versions prior to 1.0.1 are vulnerable to arbitrary HTML and script code injection vulnerability, caused by a failure of the application to properly validate IMG tag. A remote attacker could post a message containing malicious script embedded within IMG tags, and then could persuade a target user to click it. Once the URL is clicked, the embedded script would be executed in the victim's Web browser within the security context of the hosting site. A remote attacker could use this vulnerability to steal the victim's cookie-based authentication credentials and to launch further attacks.
* Note: This check solely relied on the version number of the PunBB installed on the remote web server to assess this vulnerability, so this might be a false positive.
* References: http://www.osvdb.org/displayvuln.php?osvdb_id=7977 http://www.punbb.org/changelogs/1.0_to_1.0.1.txt
* Platforms Affected: Rickard Andersson, PunBB prior to 1.0.1 Any operating system Any version |
| Recommendation |
Upgrade to the latest version of PunBB (1.1.5 or later), available from the PunBB Download Web site at http://www.punbb.org/downloads.php |
| Related URL |
(CVE) |
| Related URL |
11850 (SecurityFocus) |
| Related URL |
18542 (ISS) |
|