MyBB xmlhttp.php 'value' Parameter XSS

medium Nessus Plugin ID 53288

Synopsis

The remote web server hosts a web application that is affected by a cross-site scripting vulnerability.

Description

The version of MyBB installed on the remote host is affected by a cross-site scripting vulnerability due to improper validation of user-supplied input to 'value' parameter of the 'xmlhttp.php' script.
A remote attacker can exploit this by enticing a user to click a specially crafted URL.

Note that MyBB may also be affected by an additional cross-site scripting vulnerability. However, Nessus has not tested for the issue.

Solution

Upgrade to MyBB 1.4.15 / 1.6.2 or later.

See Also

https://blog.mybb.com/2011/02/22/mybb-1-6-2-and-1-4-15-security-update/

http://dev.mybb.com/issues/1460

Plugin Details

Severity: Medium

ID: 53288

File Name: mybb_xmlhttp_value_xss.nasl

Version: 1.12

Type: remote

Published: 4/4/2011

Updated: 6/5/2024

Configuration: Enable thorough checks

Supported Sensors: Nessus

Enable CGI Scanning: true

Vulnerability Information

CPE: cpe:/a:mybb:mybb

Required KB Items: www/PHP, installed_sw/MyBB

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/22/2011

Vulnerability Publication Date: 2/22/2011

Reference Information

BID: 47131

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990