Vulnerability CVE-2011-3371


Published: 2011-10-02   Modified: 2012-02-13

Description:
Multiple cross-site scripting (XSS) vulnerabilities in include/functions.php in PunBB before 1.3.6 allow remote attackers to inject arbitrary web script or HTML via the (1) id, (2) form_sent, (3) csrf_token, (4) req_confirm, or (5) delete parameter to delete.php, the (6) id, (7) form_sent, (8) csrf_token, (9) req_message, or (10) submit parameter to edit.php, the (11) action, (12) form_sent, (13) csrf_token, (14) req_email, or (15) request_pass parameter to login.php, the (16) email, (17) form_sent, (18) redirect_url, (19) csrf_token, (20) req_subject, (21) req_message, or (22) submit parameter to misc.php, the (23) action, (24) id, (25) form_sent, (26) csrf_token, (27) req_old_password, (28) req_new_password1, (29) req_new_password2, or (30) update parameter to profile.php, or the (31) action, (32) form_sent, (33) csrf_token, (34) req_username, (35) req_password1, (36) req_password2, (37) req_email1, (38) timezone, or (39) register parameter to register.php.

CVSS2 => (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Punbb -> Punbb 

 References:
https://github.com/punbb/punbb/commit/dd50a50a2760f10bd2d09814e30af4b36052ca6d
https://github.com/downloads/punbb/punbb/punbb-1.3.6.zip
http://www.openwall.com/lists/oss-security/2011/09/22/3
http://www.openwall.com/lists/oss-security/2011/09/18/1
http://punbb.informer.com/forums/topic/24430/punbb-136/
http://punbb.informer.com/forums/topic/24427/multiple-xss-vulnerabilities/
http://securitytracker.com/id?1026073
http://archives.neohapsis.com/archives/fulldisclosure/2011-09/0272.html
http://archives.neohapsis.com/archives/fulldisclosure/2011-09/0210.html
http://archives.neohapsis.com/archives/fulldisclosure/2011-09/0193.html

Copyright 2024, cxsecurity.com

 

Back to Top