ZeberuS has reported a vulnerability in Woltlab Burning Board, which can be exploited by malicious people to conduct script insertion attacks.
The vulnerability is caused due to an input validation error in the attachment upload handling. This can be exploited to upload a malicious image containing arbitrary HTML and script code, which is executed in a user's browser session in context of an affected site when the malicious image (e.g. a GIF file with a ".jpg" file extension) is viewed with the Microsoft Internet Explorer browser.
The vulnerability has been reported in version 2.3.5. Other versions may also be affected.
Solution: Grant only trusted users access to the application.
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org