Description
Cross-site scripting (XSS) vulnerability in the parse_query_str function in include/print.php in JSBoard 2.0.10 and 2.0.11, and possibly other versions before 2.0.12, allows remote attackers to inject arbitrary web script or HTML via parameters that are set as global variables within the program, as demonstrated using the table parameter to login.php.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Alexander Klink · textwebappsphp
https://www.exploit-db.com/exploits/27794
References (7)
Core 7
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/26211
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/25222
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/19937
Exploit, Patch, Vendor Advisory x_refsource_misc
https://www.klink.name/security/aklink-sa-2006-001-jsboard-xss.txt
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/17778
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/432714/100/0/threaded
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2006/1636
Scores
EPSS
0.0710
EPSS Percentile
91.6%
Details
Status
published
Products (5)
jsboard/jsboard
2.0.7
jsboard/jsboard
2.0.8
jsboard/jsboard
2.0.9
jsboard/jsboard
2.0.10
jsboard/jsboard
< 2.0.11
Published
May 02, 2006
Tracked Since
Feb 18, 2026