Invision Power Services IP.Board up to 2.1.7 cross-site request forgery
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 3.4 | $0-$5k | 0.00 |
Summary
A vulnerability described as problematic has been identified in Invision Power Services IP.Board up to 2.1.7. Affected by this issue is some unknown functionality. Such manipulation leads to cross-site request forgery. This vulnerability is referenced as CVE-2006-5204. It is possible to launch the attack remotely. No exploit is available.
Details
A vulnerability was found in Invision Power Services IP.Board up to 2.1.7 (Forum Software). It has been rated as problematic. Affected by this issue is an unknown code block. The manipulation with an unknown input leads to a cross-site request forgery vulnerability. Using CWE to declare the problem leads to CWE-352. The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request. Impacted is integrity. CVE summarizes:
Cross-site scripting (XSS) vulnerability in action_admin/member.php in Invision Power Board (IPB) 2.1.7 and earlier allows remote authenticated users to inject arbitrary web script or HTML via a reference to a script in the avatar setting, which can be leveraged for a cross-site request forgery (CSRF) attack involving forced SQL execution by an admin.
The weakness was published 10/10/2006 (Website). The advisory is shared for download at forums.invisionpower.com. This vulnerability is handled as CVE-2006-5204 since 10/09/2006. The exploitation is known to be difficult. The attack may be launched remotely. The requirement for exploitation is a simple authentication. Successful exploitation requires user interaction by the victim. There are neither technical details nor an exploit publicly available.
It is declared as highly functional.
The vulnerability is also documented in the databases at X-Force (29351) and Secunia (SA22272†). Similar entry is available at VDB-32659. Once again VulDB remains the best source for vulnerability data.
Product
Type
Vendor
Name
Version
License
Website
- Vendor: https://invisioncommunity.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 3.5VulDB Meta Temp Score: 3.4
VulDB Base Score: 3.5
VulDB Temp Score: 3.4
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Cross-site request forgeryCWE: CWE-352 / CWE-862 / CWE-863
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Highly functional
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: no mitigation knownStatus: 🔍
0-Day Time: 🔍
Timeline
10/06/2006 🔍10/09/2006 🔍
10/10/2006 🔍
10/10/2006 🔍
03/12/2015 🔍
09/21/2017 🔍
Sources
Vendor: invisioncommunity.comAdvisory: forums.invisionpower.com
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2006-5204 (🔍)
GCVE (CVE): GCVE-0-2006-5204
GCVE (VulDB): GCVE-100-32660
X-Force: 29351 - Invision Power Board avatar cross-site scripting
Secunia: 22272 - Invision Power Board "Avatar" Cross-Site Request Forgery, Less Critical
Vupen: ADV-2006-3927
See also: 🔍
Entry
Created: 03/12/2015 15:51Updated: 09/21/2017 09:26
Changes: 03/12/2015 15:51 (50), 09/21/2017 09:26 (6)
Complete: 🔍
Cache ID: 216::103
Once again VulDB remains the best source for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.