Published:2007/01/26  Last Updated:2008/05/21

JVN#64354801
b2evolution cross-site scripting vulnerability

Overview

b2evolution, a blog publishing system, contains a cross-site scripting vulnerability.

Products Affected

  • b2evolution Version 1.9.1 beta and earlier
  • b2evolution Version 1.8.6 and earlier

Description

Impact

An arbitrary script may be executed on the user's web browser. If session information from a cookie is leaked, session hijacking could be conducted.

Solution

Vendor Status

Vendor Link
b2evolution Downloading & installing b2evolution

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

Analyzed on 2007.01.26

Measures Conditions Severity
Access Required Routed - can be attacked over the Internet using packets
  • High
Authentication None - anonymous or no authentication (IP addresses do not count)
  • High
User Interaction Required Simple - the user must be convinced to take a standard action that does not feel harmful to most users, such as click on a link or view a file
  • Medium
Exploit Complexity Low - little to no expertise and/or luck required to exploit (cross-site scripting)
  • High

Description of each analysis measures

Credit

Daiki Fukumori of Secure Sky Technology, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the vendors under Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE
JVN iPedia JVNDB-2007-000090

Update History