vBulletin < 3.6.7 calendar.php title Parameter Persistent HTML Injection

medium Nessus Network Monitor Plugin ID 3994

Synopsis

The remote host is vulnerable to an HTML injection attack.

Description

The version of vBulletin installed on the remote host fails to properly sanitize user-supplied input. Specifically, the 'title' parameter of the calendar.php script can be used by an attacker to inject script code into a public section of the bulletin board. An attacker exploiting this flaw would only need the ability to post data to the calendar.php script. When an unsuspecting user browses the site, the script code would be executed within the client browser.

Solution

Upgrade to version 3.6.7 or higher.

See Also

http://www.vbulletin.com

Plugin Details

Severity: Medium

ID: 3994

Family: CGI

Published: 5/17/2007

Updated: 3/6/2019

Risk Information

VPR

Risk Factor: Low

Score: 3.8

CVSS v2

Risk Factor: Medium

Base Score: 5.2

Temporal Score: 4.3

Vector: CVSS2#AV:A/AC:L/Au:S/C:P/I:P/A:P

CVSS v3

Risk Factor: Medium

Base Score: 5.5

Temporal Score: 5.1

Vector: CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:X

Vulnerability Information

CPE: cpe:/a:vbulletin:vbulletin

Reference Information

CVE: CVE-2007-2908

BID: 24020