Name : Cross-site scripting vulnerability in Invision Power Board version 3.2.3 Software : Invision Power Board version 3.2.3 Vendor Homepage : http://www.invisionpower.com Vulnerability Type : Cross-site scripting Researcher : Vasil A. xss@9y.com Description -------------------- Invision Power Board (abbreviated IPB, IP.Board or IP Board) is an Internet forum software produced by Invision Power Services, Inc. It is written in PHP and primarily uses MySQL as a database management system, although support for other database engines is available. Details -------------------- IP Board is affected by a Cross-site scripting vulnerability in version 3.2.3. Example PoC url is as follows : http://example.com/forums/index.php?showforum=53"> Additional notes: 1.If a forum contain sub-forums this vulnerability don't exist. 2.Most of boards uses "Friendly Url style",but the attack can be performed by using "legacy URL style" in the query,e.g : http://example.com/forum/index.php?showforum=2"> instead: http://example.com/forum/index.php?/forum/2-example/ Solution -------------------- The vendor issued patch for this vulnerability. Please see the references. Advisory Timeline -------------------- 10/03/2012 - First contact: Sent the vulnerability details 12/03/2012 - Second contact: Ask for patch 14/03/2012 - Vulnerability Fixed 15/03/2012 - Vulnerability Released Credits ------------------- It has been discovered on testing of Netsparker, Web Application Security Scanner - http://www.mavitunasecurity.com/netsparker/.