VID |
21848 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
WWW |
Detailed Description |
The vBulletin software, according to its version number, has a cross-site scripting vulnerability in the email field. vBulletin is a PHP-based Web forum, developed by Jelsoft Enterprises, that uses a MySQL database. vBulletin versions prior to 3.5.4 are vulnerable to a cross-site scripting vulnerability, caused by improper validation of user-supplied input passed to the email field of the profile.php script. This vulnerability could permit a remote attacker to create a malicious URI link that includes hostile HTML and script code. If this link were to be followed, the hostile code may be rendered in the web browser of the victim user. This would occur in the security context of the affected web site and may allow for theft of cookie-based authentication credentials or other attacks.
* Note: This check solely relied on the version number of vBulletin on the remote Web server to assess this vulnerability, so this might be a false positive.
* References: http://www.vbulletin.com/forum/showthread.php?t=176170 http://www.securityfocus.com/archive/1/426537/30/0/threaded http://secunia.com/advisories/19100/
* Platforms Affected: Jelsoft Enterprises Limited, vBulletin versions prior to 3.5.4 Any Operating system Any version |
Recommendation |
Upgrade to the latest version of vBulletin (3.5.4 or later), available from the vBulletin Web site at http://www.vbulletin.com/forum/showthread.php?t=176170 |
Related URL |
CVE-2006-1040 (CVE) |
Related URL |
16919 (SecurityFocus) |
Related URL |
25022 (ISS) |
|