Invision Power Board index.php Multiple Parameter XSS

medium Nessus Plugin ID 18201

Synopsis

The remote web server contains a PHP script that is prone to cross- site scripting attacks.

Description

The version of Invision Power Board installed on the remote host suffers from a cross-site scripting vulnerability due to its failure to sanitize user input via the 'act' parameter to the 'index.php' script. An unauthenticated attacker can exploit this flaw by injecting malicious HTML and script code through the nickname field to redirect forum visitors to arbitrary sites, steal authentication cookies, and the like.

Additional parameters in the index.php script have been reported vulnerable. However, Nessus has not checked for them.

Solution

Upgrade to Invision Power Board 2.0.4 or later.

See Also

http://www.governmentsecurity.org/forum/index.php?act=ST&f=26&t=14656

Plugin Details

Severity: Medium

ID: 18201

File Name: invision_power_board_act_xss.nasl

Version: 1.20

Type: remote

Published: 5/5/2005

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.5

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: cpe:/a:invisionpower:invision_power_board

Required KB Items: www/invision_power_board

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Vulnerability Publication Date: 4/29/2005

Reference Information

CVE: CVE-2005-1443

BID: 13483

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990