VID |
21704 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
A version of PHP-Fusion which is older than version 6.00.108 is detected as running on the host. PHP-Fusion is a freely available content management system (CMS) written in PHP which uses MySQL. PHP-Fusion versions 6.00.107 and earlier are vulnerable to a script injection vulnerability, caused by improper validation of user-supplied input passed to nested 'url' BBcode tags. This vulnerability could permit a remote attacker to create a malicious URI link that includes hostile HTML and script code. If this link were to be followed, the hostile code may be rendered in the web browser of the victim user. This would occur in the security context of the affected web site and may allow for theft of cookie-based authentication credentials or other attacks.
* Note: This check solely relied on the version number of the PHP-Fusion installed on the remote Web server to assess this vulnerability, so this might be a false positive.
* References: http://secunia.com/advisories/16632/ http://www.securityfocus.com/archive/1/409490
* Platforms Affected: digitanium, PHP-Fusion versions 6.00.107 and earlier Any operating system Any version |
Recommendation |
No upgrade or patch available as of September 2005.
Upgrade to the latest version of PHP-Fusion (6.00.108 or later), when new fixed version becomes available from the PHP-Fusion Web page http://sourceforge.net/projects/php-fusion/ |
Related URL |
CVE-2005-2783 (CVE) |
Related URL |
14688 (SecurityFocus) |
Related URL |
22056 (ISS) |
|