Korean
<< Back
VID 21909
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The UBB.threads software is vulnerable to a cross-site scripting vulnerability via the 'debug' parameter. UBB.Threads is a bulletin board system written in PHP. UBB.threads version 6.5.3 and earlier versions are vulnerable to a cross-site scripting vulnerability, caused by improper validation of user-supplied input passed to the 'debug' parameter in the 'ubbthreads.php' and other scripts. This vulnerability could permit a remote attacker to create a malicious URI link that includes hostile HTML and script code. If this link were to be followed, the hostile code may be rendered in the web browser of the victim user. This would occur in the security context of the affected web site and may allow for theft of cookie-based authentication credentials or other attacks.

* References:
http://www.securityfocus.com/archive/1/435288/30/0/threaded
http://www.securityfocus.com/archive/1/435296/30/0/threaded
http://secunia.com/advisories/20353/

* Platforms Affected:
Groupee, Inc., UBB.threads version 6.5.3 and earlier versions
Any operating system Any version
Recommendation No upgrade or patch available as of June 2006.

Upgrade to a version of UBB.threads greater than 6.5.3, when new fixed version becomes available from the ubbcentral Web site at http://www.ubbcentral.com/ubbthreads/

As a workaround, disable PHP's 'register_globals' setting.
Related URL CVE-2006-2755 (CVE)
Related URL 18152 (SecurityFocus)
Related URL 26870 (ISS)