vBulletin 2.0/2.2.x - Cross-Site Scripting

Author: Sp.IC
type: webapps
platform: java
port: 
date_added: 2002-10-18  
date_updated: 2012-10-13  
verified: 1  
codes: CVE-2002-1922;OSVDB-59094  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 21946.txt  
source: https://www.securityfocus.com/bid/5997/info

vBulletin does not filter HTML tags from URI parameters, making it prone to cross-site scripting attacks.

As a result, it is possible for a remote attacker to create a malicious link containing script code which will be executed in the browser of a legitimate user, in the context of the website running vBulletin.

This issue may be exploited to steal cookie-based authentication credentials from legitimate users of the website running the vulnerable software.

http://<victim>/usercp.php?s=[Session ID]"><Script>alert(document.cookie);</Script>