Phorum 5.2.x < 5.2.17 'control.php' 'real_name' XSS

This script is Copyright (C) 2011-2014 Tenable Network Security, Inc.


Synopsis :

The remote web application may be affected by a cross-site scripting
vulnerability

Description :

According to its self-reported version number, the instance of Phorum
5.2.x hosted on the remote website is earlier than 5.2.17 and
therefore may be affected by a cross-site scripting vulnerability.

The parameter 'real_name' is not properly sanitized by the script
'control.php' before it is passed to the user. This could be
exploited to inject arbitrary HTML or script code into a user's
browser session in the context of the affected site.

Note that Nessus did not actually test for the flaw but instead has
relied on the version in Phorum's login page.

See also :

http://www.phorum.org/phorum5/read.php?64,149490,149490#msg-149490
http://holisticinfosec.org/content/view/184/45/

Solution :

Update to Phorum version 5.2.17 or later.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 3.6
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: CGI abuses : XSS

Nessus Plugin ID: 56240 ()

Bugtraq ID: 49347

CVE ID: CVE-2011-3392