Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> CGI abuses >> BasiliX Message Content Script Injection Vulnerability

Vulnerability Assessment Details

BasiliX Message Content Script Injection Vulnerability

Vulnerability Assessment Summary
Checks for message content script injection vulnerability in BasiliX

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote web server contains PHP scripts that are prone to cross-site
scripting attacks.

Description :

The remote host appears to be running a BasiliX version 1.1.0 or lower.
Such versions are vulnerable to cross-scripting attacks since they do
not filter HTML tags when showing a message. As a result, a possible hacker
can include arbitrary HTML and script code in a message and have that
code executed by the user's browser when it is viewed.

See also :

Solution :

Upgrade to BasiliX version 1.1.1 or later.

Network Security Threat Level:

Low / CVSS Base Score : 2

Networks Security ID: 5060

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 George A. Theall

Cables, Connectors


No Discussions have been posted on this vulnerability.