Executive Summary

Informations
Name CVE-2005-2057 First vendor Publication 2005-06-29
Vendor Cve Last vendor Modification 2024-11-20

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P)
Cvss Base Score 6.8 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Multiple cross-site scripting (XSS) vulnerabilities in Infopop UBB.Threads before 6.5.2 Beta allow remote attackers to inject arbitrary web script or HTML via the (1) Searchpage parameter to dosearch.php, (2) Number, (3) what, or (4) page parameter to newreply.php, (5) Number, (6) Board, or (7) what parameter to showprofile.php, (8) fpart or (9) page parameter to showflat.php, or (10) like parameter to showmembers.php.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2057

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 20

Open Source Vulnerability Database (OSVDB)

Id Description
17517 UBB.threads dosearch.php Searchpage Parameter XSS

UBB.thread contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'Searchpage' variable upon submission to the 'dosearch.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.
17516 UBB.threads showmembers.php like Parameter XSS

UBB.threads contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'like' variable upon submission to the 'showmembers.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.
17515 UBB.threads showflat.php Multiple Parameter XSS

UBB.threads contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'fpart' & 'page' variables upon submission to the 'showflat.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.
17514 UBB.threads showprofile.php Multiple Parameter XSS

UBB.threads contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the the 'Number', 'Board', and 'what' variables upon submission to the 'showprofile.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.
17513 UBB.threads newreply.php Multiple Parameter XSS

UBB.threads contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'Number', 'what', & 'page' variables upon submission to the 'newreply.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Nessus® Vulnerability Scanner

Date Description
2005-04-20 Name : The remote web server contains a PHP application that is affected by numerous...
File : ubbthreads_printthread_sql_injection.nasl - Type : ACT_MIXED_ATTACK

Sources (Detail)

http://marc.info/?l=bugtraq&m=111963737202040&w=2
http://www.gulftech.org/?node=research&article_id=00084-06232005
http://www.ubbcentral.com/boards/showflat.php/Cat/0/Number/42351/Main/42351/#...
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
Date Informations
2024-11-28 23:22:04
  • Multiple Updates
2024-11-28 12:07:12
  • Multiple Updates
2021-05-04 12:03:02
  • Multiple Updates
2021-04-22 01:03:18
  • Multiple Updates
2020-05-23 00:16:39
  • Multiple Updates
2016-10-18 12:01:43
  • Multiple Updates
2014-02-17 10:31:53
  • Multiple Updates
2013-05-11 11:27:48
  • Multiple Updates