ID CVE-2005-4260
Summary Interpretation conflict in includes/mainfile.php in PHP-Nuke 7.9 and later allows remote attackers to perform cross-site scripting (XSS) attacks by replacing the ">" in the tag with a "<", which bypasses the regular expressions that sanitize the data, but is automatically corrected by many web browsers. NOTE: it could be argued that this vulnerability is due to a design limitation of many web browsers; if so, then this should not be treated as a vulnerability in PHP-Nuke.
References
Vulnerable Configurations
  • cpe:2.3:a:francisco_burzi:php-nuke:7.0:*:*:*:*:*:*:*
    cpe:2.3:a:francisco_burzi:php-nuke:7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:francisco_burzi:php-nuke:7.1:*:*:*:*:*:*:*
    cpe:2.3:a:francisco_burzi:php-nuke:7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:francisco_burzi:php-nuke:7.2:*:*:*:*:*:*:*
    cpe:2.3:a:francisco_burzi:php-nuke:7.2:*:*:*:*:*:*:*
  • cpe:2.3:a:francisco_burzi:php-nuke:7.3:*:*:*:*:*:*:*
    cpe:2.3:a:francisco_burzi:php-nuke:7.3:*:*:*:*:*:*:*
  • cpe:2.3:a:francisco_burzi:php-nuke:7.6:*:*:*:*:*:*:*
    cpe:2.3:a:francisco_burzi:php-nuke:7.6:*:*:*:*:*:*:*
  • cpe:2.3:a:francisco_burzi:php-nuke:7.7:*:*:*:*:*:*:*
    cpe:2.3:a:francisco_burzi:php-nuke:7.7:*:*:*:*:*:*:*
  • cpe:2.3:a:francisco_burzi:php-nuke:7.8:*:*:*:*:*:*:*
    cpe:2.3:a:francisco_burzi:php-nuke:7.8:*:*:*:*:*:*:*
  • cpe:2.3:a:francisco_burzi:php-nuke:7.9:*:*:*:*:*:*:*
    cpe:2.3:a:francisco_burzi:php-nuke:7.9:*:*:*:*:*:*:*
CVSS
Base: 4.3 (as of 19-10-2018 - 15:40)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
cvss-vector via4 AV:N/AC:M/Au:N/C:N/I:P/A:N
refmap via4
bid 15855
bugtraq
  • 20051214 Bypass XSS filter in PHPNUKE 7.9=>x
  • 20051220 Re: XSS bypass in PHPNuke - FIX ?
Last major update 19-10-2018 - 15:40
Published 15-12-2005 - 11:03
Last modified 19-10-2018 - 15:40
Back to Top