Synopsis
The remote host is vulnerable to an HTML Injection attack.
Description
The remote host is running a version of PHP-Fusion that is vulnerable to an HTML injection flaw. Specifically, the submit.php script fails to properly sanitize input data via the 'news_body', 'article_description', and 'user_pass' parameters. An attacker exploiting this flaw would typically need to be able to convince a remote user to browse to a malicious URI. A successful attack would yield potentially confidential data (cookies, credentials) as well as potentially execute malicious code within the context of the vulnerable server.
Solution
Upgrade to version 6.00.106 or higher.
Plugin Details
Nessus ID: 19232
Risk Information
Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
Temporal Vector: CVSS:3.0/E:H/RL:U/RC:X
Vulnerability Information
CPE: cpe:/a:php_fusion:php_fusion