vBulletin contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the "what" variable upon submission to the "memberlist.php" script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.
Currently, there are no known upgrades, patches, or workarounds available to correct this issue.
vBulletin contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the "what" variable upon submission to the "memberlist.php" script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.
http://[victim]/memberlist.php?action=getall&what=[XSS]<r=&perpage=25&orderby=username
Security Tracker: 1009440 Secunia Advisory ID:11142 Related OSVDB ID: 4310 Related OSVDB ID: 4309 Related OSVDB ID: 4311 Other Advisory URL: http://www.gulftech.org/03152004b.php Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2004-03/0147.html ISS X-Force ID: 15495 Bugtraq ID: 9887