Vulnerability CVE-2006-0800


Published: 2006-02-20   Modified: 2012-02-12

Description:
Interpretation conflict in PostNuke 0.761 and earlier allows remote attackers to conduct cross-site scripting (XSS) attacks via HTML tags with a trailing "<" character, which is interpreted as a ">" character by some web browsers but bypasses the blacklist protection in (1) the pnVarCleanFromInput function in pnAPI.php, (2) the pnSecureInput function in pnAntiCracker.php, and (3) the htmltext parameter in an edituser operation to user.php.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
Multiple vulnerabilities in PostNuke <= 0.761
Maksymilian Arci...
19.02.2006

Type:

CWE-79

(Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'))

CVSS2 => (AV:N/AC:H/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
2.6/10
2.9/10
4.9/10
Exploit range
Attack complexity
Authentication
Remote
High
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Postnuke software foundation -> Postnuke 

 References:
http://xforce.iss.net/xforce/xfdb/24823
http://www.securityfocus.com/bid/16752
http://secunia.com/advisories/18937
http://news.postnuke.com/index.php?name=News&file=article&sid=2754
http://www.vupen.com/english/advisories/2006/0673
http://securityreason.com/securityalert/454
http://securityreason.com/securityalert/454
http://archives.neohapsis.com/archives/fulldisclosure/2006-02/0469.html

Copyright 2024, cxsecurity.com

 

Back to Top