File: 2227.txt

package info (click to toggle)
snort 2.9.7.0-5
  • links: PTS, VCS
  • area: main
  • in suites: buster, sid, stretch
  • size: 55,000 kB
  • ctags: 38,464
  • sloc: ansic: 266,667; sh: 12,508; makefile: 2,908; yacc: 497; perl: 496; lex: 261; sed: 14
file content (60 lines) | stat: -rw-r--r-- 1,227 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
Rule:  

--
Sid:
2227

--
Summary:
This event is generated when an attempt is made to exploit a known 
vulnerability in the PHP application Pod.Board.

--
Impact:
Execution of arbitrary code on the client machine connecting to the host
running the application. Theft of cookie data not limited to 
authentication credentials is possible.

--
Detailed Information:
The forum_details.php script does not properly check data supplied in 
input fields or via URI parameters which leads to HTML injection 
possibilites. This injection can include malicious script of the 
attackers choosing.

--
Affected Systems:
	planetinsanity.de pod.board 1.1

--
Attack Scenarios:
A cross site scripting attack is possible, the attacker would need to 
entice the victim to use a link supplied by the attacker which could 
then divulge login and cookie information.

--
Ease of Attack:
Moderate to Difficult. No exploit software required.

--
False Positives:
None known.

--
False Negatives:
None known.

--
Corrective Action:
Upgrade to the latest non-affected version of the software.

--
Contributors:
Sourcefire Research Team
Brian Caswell <bmc@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>

-- 
Additional References:

--