punBB < 1.2.5 Multiple SQL Injection and Authentication Bypass Vulnerabilities

low Nessus Network Monitor Plugin ID 2715

Synopsis

The remote host is vulnerable to an HTML injection attack.

Description

The remote host is running punBB, a web-based bulletin board. This version of punBB is vulnerable to multiple remote HTML injection attacks. Specifically, failure to correctly parse the 'email' and 'Jabber' variables of the profile page leads to a condition where attackers can insert bogus HTTP headers and content into a client browser session. In order to affect such an attack, the attacker would typically need to be able to entice a remote user into perusing a malicious URI. A successful attack would lead to a loss of confidential data (such as authentication or state cookies) or the execution of malicious code within the browser.

Solution

Upgrade to version 1.2.5 or higher.

See Also

http://securitytracker.com/alerts/2005/Mar/1013446.html

Plugin Details

Severity: Low

ID: 2715

Family: CGI

Published: 3/17/2005

Updated: 3/6/2019

Nessus ID: 17363

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS v3

Risk Factor: Low

Base Score: 3.7

Temporal Score: 3.6

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:X

Vulnerability Information

CPE: cpe:/a:punbb:punbb

Reference Information

CVE: CVE-2005-0818

BID: 12828