vendor:
Vbulletin Blog
by:
FormatXformat
7,5
CVSS
HIGH
Cross-Site Scripting (XSS)
79
CWE
Product Name: Vbulletin Blog
Affected Version From: Vbulletin 4.0.2
Affected Version To: Vbulletin 4.0.2
Patch Exists: NO
Related CWE: N/A
CPE: a:vbulletin:vbulletin_blog:4.0.2
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2010
Vbulletin Blog 4.0.2 XSS Vulnerability
The script is affected by Permanent XSS vulnerability, so you can put in bad java script code <script>alert('put this script in title')</script> <meta http-equiv='Refresh' content='0;URL=http://db-exploit.com'> 1st register, Go to Blogs page, Create New Post, Inject your java script into Title Box, You must go back to Main page to see this XSS effect.
Mitigation:
Input validation, output encoding, and proper access control should be implemented to prevent XSS attacks.