header-logo
Suggest Exploit
vendor:
vBulletin
by:
Unknown
5.5
CVSS
MEDIUM
Cross-Site Scripting (XSS)
79
CWE
Product Name: vBulletin
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: NO
Related CWE:
CPE: a:vbulletin:vbulletin
Metasploit:
Other Scripts:
Platforms Tested:
Unknown

Cross-Site Scripting in Two-Step External Link module for vBulletin

The Two-Step External Link module for vBulletin is vulnerable to a cross-site scripting (XSS) attack. This vulnerability occurs due to the application's failure to properly sanitize user-supplied input. An attacker can exploit this vulnerability by injecting arbitrary script code into the 'url' parameter of the 'externalredirect.php' script. When an unsuspecting user visits the affected site and clicks on the malicious link, the injected script code will execute in their browser, allowing the attacker to steal their cookie-based authentication credentials and potentially launch further attacks.

Mitigation:

To mitigate this vulnerability, it is recommended to apply proper input validation and sanitization techniques to the affected module. Additionally, vBulletin users should keep their installations up to date with the latest security patches and updates.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/39597/info

Two-Step External Link module for vBulletin is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input.

An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

http://www.example.com/externalredirect.php?url=XSS