paBox pabox.php posticon Parameter XSS

This script is Copyright (C) 2005-2011 Tenable Network Security, Inc.


Synopsis :

The remote web server contains a PHP script that is prone to a cross-
site scripting attack.

Description :

The remote host is running paBox, a web application written in PHP.

The remote version of paBox installed on the remote host does not
properly sanitize input supplied through the 'posticon' parameter used
to select a 'smilie' for a post. By exploiting this flaw, an attacker
can inject HTML and script code into the browser of users who view the
affected post, potentially stealing authentication cookies and
controlling how the affected application is rendered.

See also :

http://www.securityfocus.com/archive/1/393156

Solution :

Unknown at this time.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 4.3
(CVSS2#E:H/RL:U/RC:ND)
Public Exploit Available : true

Family: CGI abuses : XSS

Nessus Plugin ID: 17336 ()

Bugtraq ID: 12796

CVE ID: