| VID |
21510 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The YaBB software is vulnerable to a cross-site scripting vulnerability in the 'usersrecentposts' field. YaBB, "Yet Another Bulletin Board", is an open-source Bulletin Board system written in Perl. YaBB2 RC1 is vulnerable to a cross-site scripting vulnerability, caused by improper validation of user-supplied input in the 'username' parameter in the 'usersrecentposts' action. This vulnerability could permit a remote attacker to create a malicious URI link that includes hostile HTML and script code. If this link were to be followed, the hostile code may be rendered in the web browser of the victim user. This would occur in the security context of the affected web site and may allow for theft of cookie-based authentication credentials or other attacks.
* References: http://www.securitytracker.com/alerts/2005/Mar/1013420.html http://yabbtest.spikecity.net/cgi-bin/SP2/YaBB.pl?num=1110675739
* Platforms Affected: YaBB2 RC1 Any version Any operating system Any version |
| Recommendation |
Upgrade to the latest version of YaBB(2 RC1 dated March 14, 2005 or later), available from the YaBB Download Web page at http://www.yabbforum.com/downloads.php |
| Related URL |
CVE-2005-0785 (CVE) |
| Related URL |
12756 (SecurityFocus) |
| Related URL |
19671 (ISS) |
|