Phorum 5.2.x < 5.2.17 'control.php' 'real_name' XSS

This script is Copyright (C) 2011-2016 Tenable Network Security, Inc.


Synopsis :

The remote web application may be affected by a cross-site scripting
vulnerability

Description :

According to its self-reported version number, the instance of Phorum
5.2.x hosted on the remote website is earlier than 5.2.17 and
therefore may be affected by a cross-site scripting vulnerability.

The parameter 'real_name' is not properly sanitized by the script
'control.php' before it is passed to the user. This could be
exploited to inject arbitrary HTML or script code into a user's
browser session in the context of the affected site.

Note that Nessus did not actually test for the flaw but instead has
relied on the version in Phorum's login page.

See also :

http://www.phorum.org/phorum5/read.php?64,149490,149490#msg-149490
http://holisticinfosec.org/content/view/184/45/

Solution :

Update to Phorum version 5.2.17 or later.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 3.7
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: CGI abuses : XSS

Nessus Plugin ID: 56240 ()

Bugtraq ID: 49347

CVE ID: CVE-2011-3392

Ready to Scan Unlimited IPs & Run Compliance Checks?

Upgrade to Nessus Professional today!

Buy Now

Combine the Power of Nessus with the Ease of Cloud

Start your free Nessus Cloud trial now!

Begin Free Trial