PHP-Fusion < 6.00.106 submit.php Multiple Parameter HTML Injection

low Nessus Network Monitor Plugin ID 3037

Synopsis

The remote host is vulnerable to an HTML Injection attack.

Description

The remote host is running a version of PHP-Fusion that is vulnerable to an HTML injection flaw. Specifically, the submit.php script fails to properly sanitize input data via the 'news_body', 'article_description', and 'user_pass' parameters. An attacker exploiting this flaw would typically need to be able to convince a remote user to browse to a malicious URI. A successful attack would yield potentially confidential data (cookies, credentials) as well as potentially execute malicious code within the context of the vulnerable server.

Solution

Upgrade to version 6.00.106 or higher.

Plugin Details

Severity: Low

ID: 3037

Family: CGI

Published: 6/27/2005

Updated: 3/6/2019

Nessus ID: 19232

Risk Information

VPR

Risk Factor: Low

Score: 3.5

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

CVSS v3

Risk Factor: Low

Base Score: 3.7

Temporal Score: 3.7

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

Temporal Vector: CVSS:3.0/E:H/RL:U/RC:X

Vulnerability Information

CPE: cpe:/a:php_fusion:php_fusion

Reference Information

CVE: CVE-2005-2074, CVE-2005-2075

BID: 14066