Phorum < 5.0.15 HTML Injection

low Nessus Network Monitor Plugin ID 2705

Synopsis

The remote host is vulnerable to an HTML injection attack.

Description

The remote host is running Phorum, a web-based content management system written in PHP. This version of Phorum is vulnerable to a remote HTML injection flaw. An attacker exploiting this flaw would only need to be able to send HTTP requests to the vulnerable application. A successful exploit would result in potential theft of confidential data (configuration data, browser cookies, and more) or browser-side code execution.
In addition, the version of Phorum installed on the remote host does not properly sanitize input used in the Location response header. An attacker can exploit this flaw with a specially-crafted request to inject malicious code into HTTP headers, which may allow execution of arbitrary HTML and script code in a user's browser within the context of the remote host.

Solution

Upgrade to version 5.0.15 or higher.

See Also

http://www.securityfocus.com/archive/1/393953

http://www.phorum.org/story.php?48

Plugin Details

Severity: Low

ID: 2705

Family: Web Servers

Published: 3/14/2005

Updated: 3/6/2019

Nessus ID: 17350, 17596

Risk Information

VPR

Risk Factor: Low

Score: 3.8

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS v3

Risk Factor: Low

Base Score: 3.7

Temporal Score: 3.7

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:H/RL:U/RC:X

Vulnerability Information

CPE: cpe:/a:phorum:phorum

Reference Information

CVE: CVE-2005-0783, CVE-2005-0784, CVE-2005-0843

BID: 12800, 12869