id: CVE-2004-1965 info: name: Open Bulletin Board (OpenBB) v1.0.6 - Open Redirect/XSS author: ctflearner severity: medium description: | Multiple cross-site scripting (XSS) vulnerabilities in Open Bulletin Board (OpenBB) 1.0.6 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) redirect parameter to member.php, (2) to parameter to myhome.php (3) TID parameter to post.php, or (4) redirect parameter to index.php. remediation: | Upgrade to a patched version of Open Bulletin Board (OpenBB) or apply necessary security patches to mitigate the vulnerabilities. reference: - https://www.exploit-db.com/exploits/24055 - https://nvd.nist.gov/vuln/detail/CVE-2004-1965 - http://marc.info/?l=bugtraq&m=108301983206107&w=2 - https://exchange.xforce.ibmcloud.com/vulnerabilities/15966 classification: cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:N cvss-score: 4.3 cve-id: CVE-2004-1965 cwe-id: NVD-CWE-Other epss-score: 0.0113 epss-percentile: 0.83011 cpe: cpe:2.3:a:openbb:openbb:1.0.0_beta1:*:*:*:*:*:*:* metadata: max-request: 1 vendor: openbb product: openbb tags: cve,cve2004,redirect,xss,openbb http: - method: GET path: - "{{BaseURL}}/index.php?redirect=http%3A%2F%2Fwww.interact.sh" matchers: - type: regex part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # digest: 4a0a00473045022070948ae795de846cce56a4b803d4d03df851767d2c04b9d4d3bcea28ecd84be8022100e48855b87ab4d4d08d5806b1d4cbe79878218f6c10741212717e644a9c7cd9f6:922c64590222798bb761d5b6d8e72950