header-logo
Suggest Exploit
vendor:
FuseTalk Forum
by:
Unknown
5.5
CVSS
MEDIUM
Cross-site scripting (XSS)
79
CWE
Product Name: FuseTalk Forum
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: Unknown
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested: Unknown
Unknown

Multiple input validation vulnerabilities in FuseTalk Forum

The first issue is due to insufficient sanitization of user-supplied data, which allows an attacker to construct a malicious link containing HTML or script code. The second issue occurs when malicious code is sent to the 'tombstone.cfm' script through a URI parameter.

Mitigation:

Implement proper input validation and sanitization techniques to prevent XSS attacks. Regularly update the software to the latest version.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/11407/info

FuseTalk Forum is reported prone to multiple input validation vulnerabilities. These issues may allow a remote attacker to carry out cross-site scripting attacks. The cause of these issues is insufficient sanitization of user-supplied data.

The first issue is reported to exist because the software echoes unsanitized request data as part of an error page to the origin of the request. This makes it possible for an attacker to a construct a malicious link containing HTML or script code, the attacker-supplied code will be rendered as part of an error message if a target user follows the malicious URI link.

FuseTalk Forum is reported prone to an additional cross-site scripting vulnerability.

The problem presents itself when malicious HTML and script code is sent to the 'tombstone.cfm' script through a URI parameter.

This may allow for theft of cookie-based authentication credentials or other attacks.

www.example.com\tombstone.cfm?ProfileID=<script>alert(document.cookie)</script>
cqrsecured