vBulletin < 3.7.4 Visitor Messages Add-on HTML Injection

medium Nessus Network Monitor Plugin ID 4766

Synopsis

The remote host is vulnerable to an HTML injection attack.

Description

The version of vBulletin installed on the remote host fails to properly sanitize user-supplied input. Specifically, the 'Visitor Messages' addon can be used by an attacker to inject script code into a public section of the bulletin board. An attacker exploiting this flaw would only need the ability to post data to the server. When an unsuspecting user browses the site, the script code would be executed within the client browser.

Solution

Upgrade to version 3.7.4 or higher.

See Also

http://www.vbulletin.com

Plugin Details

Severity: Medium

ID: 4766

Family: CGI

Published: 11/21/2008

Updated: 3/6/2019

Risk Information

CVSS v2

Risk Factor: Medium

Base Score: 6.4

Temporal Score: 5.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 6.2

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Reference Information

BID: 32387