First published: Tue Aug 17 2021(Updated: )
Invision Community (aka IPS Community Suite or IP-Board) before 4.6.5.1 allows stored XSS, with resultant code execution, because an uploaded file can be placed in an IFRAME element within user-generated content. For code execution, the attacker can rely on the ability of an admin to install widgets, disclosure of the admin session ID in a Referer header, and the ability of an admin to use the templating engine (e.g., Edit HTML).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Invisioncommunity Invision Power Board | <4.6.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-39250 is a vulnerability in Invision Community (aka IPS Community Suite or IP-Board) before version 4.6.5.1 that allows stored XSS with code execution.
The severity of CVE-2021-39250 is medium with a CVSS score of 5.4.
CVE-2021-39250 allows an attacker to upload a file that can be placed in an IFRAME element within user-generated content, leading to stored XSS and potential code execution.
To fix CVE-2021-39250, upgrade Invision Community to version 4.6.5.1 or higher.
Yes, you can find more information about CVE-2021-39250 in the release notes of version 4.6.5.1 and in an SSD advisory.