PHP-Fusion BBCode IMG Tag XSS

medium Nessus Plugin ID 17302

Synopsis

The remote web server hosts a PHP script that is prone to cross-site scripting attacks.

Description

The remote host is running a version of PHP-Fusion that does not sufficiently sanitize JavaScript code. Specifically, an attacker can inject JavaScript code that bypasses the filters in 'fusion_core.php' by HTML-encoding it. This code will then be executed in the context of a user's browser when viewing the malicious BBcode on the remote host.

Solution

Install the 5.01 Service Pack or upgrade to a newer version of PHP-Fusion.

See Also

https://seclists.org/bugtraq/2005/Mar/136

Plugin Details

Severity: Medium

ID: 17302

File Name: php_fusion_bbcode_img_xss.nasl

Version: 1.27

Type: remote

Published: 3/9/2005

Updated: 4/11/2022

Configuration: Enable thorough checks

Risk Information

VPR

Risk Factor: Low

Score: 3

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.7

Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Temporal Vector: E:H/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:php_fusion:php_fusion

Required KB Items: www/php_fusion, www/PHP

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Patch Publication Date: 3/5/2005

Vulnerability Publication Date: 3/7/2005

Reference Information

CVE: CVE-2005-0692

BID: 12751

CWE: 20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990