ID |
CVE-2005-4260
|
Summary |
Interpretation conflict in includes/mainfile.php in PHP-Nuke 7.9 and later allows remote attackers to perform cross-site scripting (XSS) attacks by replacing the ">" in the tag with a "<", which bypasses the regular expressions that sanitize the data, but is automatically corrected by many web browsers. NOTE: it could be argued that this vulnerability is due to a design limitation of many web browsers; if so, then this should not be treated as a vulnerability in PHP-Nuke. |
References |
|
Vulnerable Configurations |
-
cpe:2.3:a:francisco_burzi:php-nuke:7.0:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:7.0:*:*:*:*:*:*:*
-
cpe:2.3:a:francisco_burzi:php-nuke:7.1:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:7.1:*:*:*:*:*:*:*
-
cpe:2.3:a:francisco_burzi:php-nuke:7.2:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:7.2:*:*:*:*:*:*:*
-
cpe:2.3:a:francisco_burzi:php-nuke:7.3:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:7.3:*:*:*:*:*:*:*
-
cpe:2.3:a:francisco_burzi:php-nuke:7.6:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:7.6:*:*:*:*:*:*:*
-
cpe:2.3:a:francisco_burzi:php-nuke:7.7:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:7.7:*:*:*:*:*:*:*
-
cpe:2.3:a:francisco_burzi:php-nuke:7.8:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:7.8:*:*:*:*:*:*:*
-
cpe:2.3:a:francisco_burzi:php-nuke:7.9:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:7.9:*:*:*:*:*:*:*
|
CVSS |
Base: | 4.3 (as of 19-10-2018 - 15:40) |
Impact: | |
Exploitability: | |
|
CWE |
NVD-CWE-Other |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
MEDIUM |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
NONE |
PARTIAL |
NONE |
|
cvss-vector
via4
|
AV:N/AC:M/Au:N/C:N/I:P/A:N
|
refmap
via4
|
bid | 15855 | bugtraq | - 20051214 Bypass XSS filter in PHPNUKE 7.9=>x
- 20051220 Re: XSS bypass in PHPNuke - FIX ?
|
|
Last major update |
19-10-2018 - 15:40 |
Published |
15-12-2005 - 11:03 |
Last modified |
19-10-2018 - 15:40 |