Invision Power Board 3.0.5 - stored Cross site Scripting

2010.06.10
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

[MajorSecurity SA-069]Invision Power Board - stored Cross site Scripting Details ======= Product: Invision Power Board Security-Risk: moderated Remote-Exploit: yes Vendor-URL: http://www.invisionpower.com Vendor-Status: informed Advisory-Status: published Credits ============ Discovered by: David Vieira-Kurz http://www.majorsecurity.net/penetrationstest.php Affected Products: ---------------------------- Invision Power Board 3.0.5 and prior Introduction ============ Invision Power Board is a widely used forums script. More Details ============ Input passed to the calendar app (which is one of the core modules inside invision power board) is not properly sanitised before being stored and returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. The calendar can be shown on every page of the invision board, so that in fact this is a serious security issue. Solution ============= Web applications should never trust on user generated input and therefore sanatize all input. MajorSecurity ================ MajorSecurity is a German penetrationtesting and security research company which focuses on web application security. We offer professional penetrationstest, security audits, source code reviews. -- David Vieira-Kurz (CTO) Senior IT Security Consultant MajorSecurity Phone: +49 151 24 132 139 Web: http://www.majorsecurity.net Diese E-mail (sowie ihre Anhnge) ist vertraulich und nur fr den/die Adressaten bestimmt.


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top