Ultimate Bulletin Board allows hexadecimal URL encoded cross-site scripting

ultimatebb-encoded-css (7838) The risk level is classified as MediumMedium Risk


Ultimate Bulletin Board (UBB) is vulnerable to cross-site scripting. A remote attacker can post a message that contains hexadecimal URL encoded embedded JavaScript within IMG (image) HTML tags, which would be executed in the victim's Web browser once the message is viewed. An attacker could use this vulnerability to obtain a user's cookie-based authentication credentials or perform other malicious activity.




No remedy available as of September 1, 2014.


  • BugTraq Mailing List, Tue Jan 08 2002 - 17:11:59 CST: CSS vulnerabilities in YaBB and UBB allow account hijack [Multiple Vendor].
  • Infopop Web site: Ultimate Bulletin Board.
  • BID-3829: Ultimate Bulletin Board Cross-Agent Scripting Vulnerability
  • CVE-2002-0118: Cross-site scripting vulnerability in Infopop Ultimate Bulletin Board (UBB) 6.2.0 Beta Release 1.0 allows remote attackers to execute arbitrary script and steal cookies via a message containing encoded Javascript in an IMG tag.
  • OSVDB ID: 8858: Ultimate Bulletin Board Infopop IMG Tag XSS

Platforms Affected:

  • InfoPop Ultimate Bulletin Board 6.2.0 B1


Jan 08, 2002

The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this

Return to the main page