Ultimate PHP Board chat/login.php username Parameter Script Injection

Medium Nessus Network Monitor Plugin ID 3872

Synopsis

The remote host is vulnerable to a Script Injection attack.

Description

The remote host is running Ultimate PHP Board, a message board written in PHP. Versions of Ultimate less than 2.0b2 are vulnerable to a flaw where remote attackers can inject and execute script code. Code would be executed with the privileges of the web server process. The root flaw is in the 'username' parameter of the 'chat/login.php' script. After uploading the code, the attacker can execute via the 'chat/text.php' script. Successful exploitation results in the attacker impacting confidentiality, integrity, and availability.

Solution

No solution is known at this time.

Plugin Details

Severity: Medium

ID: 3872

File Name: 3872.prm

Family: CGI

Published: 2006/12/27

Modified: 2016/01/21

Dependencies: 1442

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 5.8

Temporal Score: 5.5

Vector: CVSS2#AV:A/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:U/RC:ND

CVSSv3

Base Score: 6.3

Temporal Score: 6.2

Vector: CVSS3#AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS3#E:F/RL:U/RC:X

Reference Information

CVE: CVE-2006-6790

BID: 21760