header-logo
Suggest Exploit
vendor:
TextFileBB
by:
SecurityFocus
7.5
CVSS
HIGH
Script-Injection
79
CWE
Product Name: TextFileBB
Affected Version From: 1.0.16
Affected Version To: 1.0.16
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

TextFileBB Multiple Script-Injection Vulnerabilities

TextFileBB is prone to multiple script-injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before including it in dynamically generated content. Attacker-supplied HTML and script code would be able to access properties of the site, potentially allowing the attacker to steal cookie-based authentication credentials. Other attacks are also possible.

Mitigation:

Input validation should be used to ensure that user-supplied data does not contain malicious code.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/17750/info

TextFileBB is prone to multiple script-injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before including it in dynamically generated content. 

Attacker-supplied HTML and script code would be able to access properties of the site, potentially allowing the attacker to steal cookie-based authentication credentials. Other attacks are also possible. 

These issues are reported to affect version 1.0.16; other versions may also be vulnerable.

[code][.color=#00F"onMouseOver='alert(/xss/)' x="]h0n0[/color][/code]
[code][.size=7" OnMouseOver="alert(/xss/)]Clicky Here [/size][/code]
[code][.url=http://" OnMouseOver="alert(/xss/)]hmm[/url][/code]