Ultimate PHP Board chat/login.php username Parameter Script Injection

medium Nessus Network Monitor Plugin ID 3872

Synopsis

The remote host is vulnerable to a Script Injection attack.

Description

The remote host is running Ultimate PHP Board, a message board written in PHP. Versions of Ultimate less than 2.0b2 are vulnerable to a flaw where remote attackers can inject and execute script code. Code would be executed with the privileges of the web server process. The root flaw is in the 'username' parameter of the 'chat/login.php' script. After uploading the code, the attacker can execute via the 'chat/text.php' script. Successful exploitation results in the attacker impacting confidentiality, integrity, and availability.

Solution

No solution is known at this time.

Plugin Details

Severity: Medium

ID: 3872

Family: CGI

Published: 12/27/2006

Updated: 3/6/2019

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 5.8

Temporal Score: 5.5

Vector: CVSS2#AV:A/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Medium

Base Score: 6.3

Temporal Score: 6.2

Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:F/RL:U/RC:X

Vulnerability Information

CPE: cpe:/a:ultimate_php_board:ultimate_php_board

Reference Information

CVE: CVE-2006-6790

BID: 21760