Invision Power Board COLOR SML Tag XSS

This script is Copyright (C) 2005-2014 Tenable Network Security, Inc.


Synopsis :

The remote web server contains a PHP script that is vulnerable to a
cross-site scripting attack.

Description :

According to the version number in its banner, the installation of
Invision Power Board on the remote host reportedly does not
sufficiently sanitize the 'COLOR' SML tag. A remote attacker may
exploit this vulnerability by adding a specially crafted 'COLOR' tag
with arbitrary JavaScript to any signature or post on an Invision
board. That JavaScript will later be executed in the context of users
browsing that forum, which may enable an attacker to steal cookies or
misrepresent site content.

In addition, it has been reported that an attacker can inject
arbitrary script into a signature file. However, Nessus has not tested
for this issue.

See also :

http://archives.neohapsis.com/archives/bugtraq/2005-02/0257.html
http://forums.invisionpower.com/index.php?showtopic=160633

Solution :

Apply the patch referenced in the vendor advisory above.

Risk factor :

Low / CVSS Base Score : 3.5
(CVSS2#AV:N/AC:M/Au:S/C:N/I:P/A:N)
CVSS Temporal Score : 3.5
(CVSS2#E:H/RL:U/RC:ND)
Public Exploit Available : true

Family: CGI abuses : XSS

Nessus Plugin ID: 17202 (invision_power_board_color_sml_tag.nasl)

Bugtraq ID: 12607

CVE ID: CVE-2005-0477