PHP-Fusion < 6.00.106 submit.php Multiple Parameter HTML Injection

Medium Nessus Network Monitor Plugin ID 3037


The remote host is vulnerable to an HTML Injection attack.


The remote host is running a version of PHP-Fusion that is vulnerable to an HTML injection flaw. Specifically, the submit.php script fails to properly sanitize input data via the 'news_body', 'article_description', and 'user_pass' parameters. An attacker exploiting this flaw would typically need to be able to convince a remote user to browse to a malicious URI. A successful attack would yield potentially confidential data (cookies, credentials) as well as potentially execute malicious code within the context of the vulnerable server.


Upgrade to version 6.00.106 or higher.

Plugin Details

Severity: Medium

ID: 3037

Family: CGI

Published: 2005/06/27

Modified: 2016/01/21

Dependencies: 1442

Risk Information

Risk Factor: Medium


Base Score: 4.3

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:H/RL:U/RC:ND


Base Score: 5.3

Temporal Score: 5.3


Temporal Vector: CVSS3#E:H/RL:U/RC:X

Vulnerability Information

CPE: cpe:/a:php_fusion:php_fusion

Reference Information

CVE: CVE-2005-2075, CVE-2005-2074

BID: 14066