Vulnerabilities > CVE-2006-2755 - Cross-Site Scripting vulnerability in UBBThreads

047910
CVSS 4.3 - MEDIUM
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
NONE
Availability impact
NONE
network
ubbcentral
nessus
exploit available

Summary

Cross-site scripting (XSS) vulnerability in index.php in UBBThreads 5.x and earlier allows remote attackers to inject arbitrary web script or HTML via the debug parameter, as demonstrated by stealing MD5 hashes of passwords.

Exploit-Db

descriptionUBB Threads 5.x / 6.x Multiple Remote File Inclusion Vulnerabilities. CVE-2006-2675,CVE-2006-2755. Webapps exploit for php platform
idEDB-ID:1843
last seen2016-01-31
modified2006-05-28
published2006-05-28
reporternukedx
sourcehttps://www.exploit-db.com/download/1843/
titleUBB Threads 5.x / 6.x - Multiple Remote File Inclusion Vulnerabilities

Nessus

NASL familyCGI abuses : XSS
NASL idUBBTHREADS_DEBUG_XSS.NASL
descriptionThe version of UBB.threads installed on the remote host fails to sanitize input to the
last seen2020-06-01
modified2020-06-02
plugin id21618
published2006-05-31
reporterThis script is Copyright (C) 2006-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/21618
titleUBB.threads ubbthreads.php debug Parameter XSS
code
#
# (C) Tenable Network Security
#


include("compat.inc");

if (description)
{
  script_id(21618);
  script_version("1.20");

  script_cve_id("CVE-2006-2755");
  script_bugtraq_id(18152);

  script_name(english:"UBB.threads ubbthreads.php debug Parameter XSS");
  script_summary(english:"Tries to exploit an XSS flaw in UBB.threads");

 script_set_attribute(attribute:"synopsis", value:
"The remote web server contains a PHP script that is affected by a
cross-site scripting vulnerability." );
 script_set_attribute(attribute:"description", value:
"The version of UBB.threads installed on the remote host fails to
sanitize input to the 'debug' parameter before using it in the
'ubbthreads.php' script for dynamically-generated content.  Regardless
of any PHP settings, an unauthenticated attacker may be able to
exploit this flaw to inject arbitrary HTML and script code in a user's
browser in the context of the affected website, resulting in theft of
authentication data or other such attacks." );
 script_set_attribute(attribute:"see_also", value:"https://www.securityfocus.com/archive/1/435288/30/0/threaded" );
 script_set_attribute(attribute:"see_also", value:"https://www.securityfocus.com/archive/1/435296/30/0/threaded" );
 script_set_attribute(attribute:"solution", value:
"Unknown at this time." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N");
 script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
 script_set_attribute(attribute:"exploit_available", value:"false");
 script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);

 script_set_attribute(attribute:"plugin_publication_date", value: "2006/05/31");
 script_set_attribute(attribute:"vuln_publication_date", value: "2006/05/27");
 script_cvs_date("Date: 2018/11/15 20:50:20");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_end_attributes();


  script_category(ACT_ATTACK);
  script_family(english:"CGI abuses : XSS");

  script_copyright(english:"This script is Copyright (C) 2006-2018 Tenable Network Security, Inc.");

  script_dependencies("ubbthreads_detect.nasl", "cross_site_scripting.nasl");
  script_exclude_keys("Settings/disable_cgi_scanning");
  script_require_ports("Services/www", 80);
  script_require_keys("www/ubbthreads");
  exit(0);
}

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
include("url_func.inc");

port = get_http_port(default:80);
if (!can_host_php(port:port)) exit(0);
if (get_kb_item("www/" + port + "/generic_xss")) exit(0);


# A simple alert.
xss = string('<script>alert("', SCRIPT_NAME, '")</script>');
# nb: the url-encoded version is what we need to pass in.
exss = urlencode(str:xss);


# Test an install.
install = get_kb_item(string("www/", port, "/ubbthreads"));
if (isnull(install)) exit(0);
matches = eregmatch(string:install, pattern:"^(.+) under (/.*)$");
if (!isnull(matches)) {
  dir = matches[2];

  # Try to exploit the flaw to read a file.
  r = http_send_recv3(method:"GET", port: port,
    item:string(dir, "/ubbthreads.php?", "debug=", exss));
  if (isnull(r)) exit(0);
  res = r[2];

  # There's a problem if we see our XSS.
  if (string(xss, "</body>") >< res)
  {
    security_warning(port);
    set_kb_item(name: 'www/'+port+'/XSS', value: TRUE);
    exit(0);
  }
}