vBulletin contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the "vb_login_username" variable upon submission to the "admincp/index.php" script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.
Currently, there are no known upgrades, patches, or workarounds available to correct this issue.
vBulletin contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the "vb_login_username" variable upon submission to the "admincp/index.php" script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.
http://[victim]/admincp/index.php?vb_login_username=[XSS]
Vendor URL: http://www.vbulletin.com/ Secunia Advisory ID:11142 Related OSVDB ID: 4310 Related OSVDB ID: 5568 Related OSVDB ID: 4312 Related OSVDB ID: 4309 Related OSVDB ID: 4311 Other Advisory URL: http://www.gulftech.org/03152004b.php Bugtraq ID: 9943