{"vuid":"VU#113196","idnumber":"113196","name":"phpBB contains an input validation vulnerability in \"includes/bbcode.php\"","keywords":["phpBB","includes/bbcode.php","input validation","script code injection","cross site scripting"],"overview":"phpBB fails to sanitize user input, allowing the possible inclusion of active script content in user posts.","clean_desc":"phpBB is a widely used Open Source bulletin board package written in PHP. An input validation issue has been identified that allows a malicious phpBB user to include active script code in a post. The functions to process user input to generate HTML that makes up a user post on the bulletin board fails to prevent the inclusion of active script tags. Version 2.0.15 of phpBB adds code to two functions in \"includes/bbcode.php\" to blacklist certain active script tags, as an attempt to address this vulnerability. While this may mitigate this vulnerability, in general blacklisting is not an effective counter measure to malicious user input, due to the fact that characters can be encoded in many ways.","impact":"Malicious users can post to phpBB bulletin boards and include active script code. For many users the active script code will be executed by their browsers, due to active content being enabled by default in many popular browsers. Note that proof of concept code has been made public. There are also reports of the vulnerability being exploited in order to capture site administrator authentication details, which are then used to perform further attacks unrelated to the phpBB flaw.","resolution":"The flaw has been addressed in phpBB 2.0.15. For more information on the patch please see: http://www.phpbb.com/phpBB/viewtopic.php?f=14&t=288194 Code has been added to the includes/bbcode.php to blacklist certain active script tags, as an attempt to address this vulnerability. In general blacklisting is not an effective counter measure to malicious user input, due to the fact that characters can be encoded in many ways. As a best practice, users of bulletin board sites and other sites where content is created from untrusted sources, such as the public, should consider turning off all forms of scripting support in their browsers. More information about injecting code into forums is available in the CERT/CC advisory CA-2000-02.","workarounds":"","sysaffected":"","thanks":"The phpBB development team thank \nPapaDos and Paul/Zhen-Xjell from CastleCops","author":"This document was written by Robert Mead.","public":["http://www.phpbb.com/phpBB/viewtopic.php?f=14&t=288194","http://secunia.com/advisories/15298/","http://neosecurityteam.net/Advisories/Advisory-14.txt","http://www.phpbb.com/phpBB/viewtopic.php?t=285815"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-05-09T17:47:45Z","publicdate":"2005-05-08T00:00:00Z","datefirstpublished":"2005-05-12T17:23:01Z","dateupdated":"2005-05-12T20:14:06Z","revision":17,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"12","cam_internetinfrastructure":"15","cam_population":"10","cam_impact":"10","cam_easeofexploitation":"10","cam_attackeraccessrequired":"13","cam_scorecurrent":"10.2375","cam_scorecurrentwidelyknown":"11.45625","cam_scorecurrentwidelyknownexploited":"13.40625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":10.2375,"vulnote":null}