Open Bulletin Board (OpenBB) v1.0.6 - Open Redirect/XSS
ID: CVE-2004-1965
Severity: medium
Author: ctflearner
Tags: cve,cve2004,redirect,xss,openbb
Description
Section titled “Description”Multiple cross-site scripting (XSS) vulnerabilities in Open Bulletin Board (OpenBB) 1.0.6 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) redirect parameter to member.php, (2) to parameter to myhome.php (3) TID parameter to post.php, or (4) redirect parameter to index.php.
YAML Source
Section titled “YAML Source”id: CVE-2004-1965
info: name: Open Bulletin Board (OpenBB) v1.0.6 - Open Redirect/XSS author: ctflearner severity: medium description: | Multiple cross-site scripting (XSS) vulnerabilities in Open Bulletin Board (OpenBB) 1.0.6 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) redirect parameter to member.php, (2) to parameter to myhome.php (3) TID parameter to post.php, or (4) redirect parameter to index.php. impact: | Successful exploitation of these vulnerabilities could lead to unauthorized access, phishing attacks, and potential data theft. remediation: | Upgrade to a patched version of Open Bulletin Board (OpenBB) or apply necessary security patches to mitigate the vulnerabilities. reference: - https://www.exploit-db.com/exploits/24055 - https://nvd.nist.gov/vuln/detail/CVE-2004-1965 - http://marc.info/?l=bugtraq&m=108301983206107&w=2 - https://exchange.xforce.ibmcloud.com/vulnerabilities/15966 - https://github.com/POORVAJA-195/Nuclei-Analysis-main classification: cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:N cvss-score: 4.3 cve-id: CVE-2004-1965 cwe-id: NVD-CWE-Other epss-score: 0.0113 epss-percentile: 0.84626 cpe: cpe:2.3:a:openbb:openbb:1.0.0_beta1:*:*:*:*:*:*:* metadata: max-request: 1 vendor: openbb product: openbb tags: cve,cve2004,redirect,xss,openbb
http: - method: GET path: - "{{BaseURL}}/index.php?redirect=http%3A%2F%2Fwww.interact.sh"
matchers: - type: regex part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$'# digest: 4a0a00473045022100f84083d58b2d871781c6d265978ee74b2e70991dd5399c50e9cfeb9444f2da47022047102d30874a358ee865967c889f1473e1a6406fd77db9b2c0be7c4cba0ffa79:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2004/CVE-2004-1965.yaml"