VID |
21909 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The UBB.threads software is vulnerable to a cross-site scripting vulnerability via the 'debug' parameter. UBB.Threads is a bulletin board system written in PHP. UBB.threads version 6.5.3 and earlier versions are vulnerable to a cross-site scripting vulnerability, caused by improper validation of user-supplied input passed to the 'debug' parameter in the 'ubbthreads.php' and other scripts. This vulnerability could permit a remote attacker to create a malicious URI link that includes hostile HTML and script code. If this link were to be followed, the hostile code may be rendered in the web browser of the victim user. This would occur in the security context of the affected web site and may allow for theft of cookie-based authentication credentials or other attacks.
* References: http://www.securityfocus.com/archive/1/435288/30/0/threaded http://www.securityfocus.com/archive/1/435296/30/0/threaded http://secunia.com/advisories/20353/
* Platforms Affected: Groupee, Inc., UBB.threads version 6.5.3 and earlier versions Any operating system Any version |
Recommendation |
No upgrade or patch available as of June 2006.
Upgrade to a version of UBB.threads greater than 6.5.3, when new fixed version becomes available from the ubbcentral Web site at http://www.ubbcentral.com/ubbthreads/
As a workaround, disable PHP's 'register_globals' setting. |
Related URL |
CVE-2006-2755 (CVE) |
Related URL |
18152 (SecurityFocus) |
Related URL |
26870 (ISS) |
|