Synopsis
The remote web server contains a CGI application that is prone to cross-site scripting attacks.
Description
The installed version of YaBB (Yet Another Bulletin Board) on the remote host suffers from a remote cross-site scripting flaw due to its failure to properly sanitize input passed via the 'username' parameter and used as part of the 'usersrecentposts' action. By exploiting this flaw, a remote attacker can cause arbitrary code to be executed in a user's browser in the context of the affected website, resulting in the theft of authentication data or other such attacks.
Solution
Upgrade to YaBB version 2 RC2 or greater.
Plugin Details
File Name: yabb_usersrecentposts_xss.nasl
Configuration: Enable thorough checks
Supported Sensors: Nessus
Risk Information
Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N
Vulnerability Information
Excluded KB Items: Settings/disable_cgi_scanning
Exploit Ease: No exploit is required
Vulnerability Publication Date: 3/13/2005
Reference Information
CVE: CVE-2005-0741, CVE-2005-0785
BID: 12756
CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990