| VID |
21569 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The CoolForum software is vulnerable to multiple input validation vulnerabilities. CoolForum is an Web forum software written in PHP. CoolForum versions prior to 0.8.1 could are vulnerable to multiple input validation vulnerabilities, which can be exploited by remote attackers to conduct cross-site scripting and SQL injection attacks.
1) User-supplied input passed to the 'img' parameter of the 'avatar.php' script isn't properly sanitized before being returned to users. These could be exploited to execute arbitrary HTML and script code in a user's browser session in context of a vulnerable site. 2) User-supplied input passed to the 'pseudo' parameter of the 'admin/entete.php' script and the 'ilogin' parameter of the 'register.php' script isn't properly sanitized before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
* References: http://www.securitytracker.com/alerts/2005/Mar/1013474.html
* Platforms Affected: SORIANO Denis / Cool Coyote, CoolForum versions prior to 0.8.1 Any operating system Any version |
| Recommendation |
Upgrade to the latest version of CoolForum (0.8.1 or later), available at the CoolForum Web site at http://www.coolforum.net/index.php?p=dlcoolforum |
| Related URL |
CVE-2005-0857,CVE-2005-0858 (CVE) |
| Related URL |
12852 (SecurityFocus) |
| Related URL |
19758,19759,19761 (ISS) |
|