var-200404-0098
Vulnerability from variot
Cross-site scripting (XSS) vulnerability in the cookiedecode function in mainfile.php for PHP-Nuke 6.x through 7.2, when themes are used, allows remote attackers to inject arbitrary web script or HTML via a base64-encoded user parameter or cookie. Reportedly PHP-NuKe is prone to a remote cross-site scripting vulnerability. This issue is due to a failure of the 'cookiedecode()' function to properly sanitize user supplied cookie parameters. These issues could permit a remote attacker to create a malicious link to the vulnerable application that includes hostile HTML and script code. If this link were followed, the hostile code may be rendered in the web browser of the victim user. This would occur in the security context of the affected web site and may allow for theft of cookie-based authentication credentials or other attacks. PHP-Nuke is a popular website creation and management tool, it can use many database software as backend, such as MySQL, PostgreSQL, mSQL, Interbase, Sybase, etc. The mainfile.php script cookiedecode() function included in PHP-Nuke lacks sufficient filtering for input submitted by users. The \'\'cookiedecode()\'\' function incorrectly filters the cookie parameters provided by the user, and the attacker builds a malicious connection to lure the user to visit, which can cause malicious code to be executed on the user's browser, allowing the attacker to obtain the sensitive information of the target user. information
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200404-0098", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "php-nuke", "scope": "eq", "trust": 1.6, "vendor": "francisco burzi", "version": "7.2" }, { "model": "php-nuke", "scope": "eq", "trust": 1.6, "vendor": "francisco burzi", "version": "6.0" }, { "model": "php-nuke", "scope": "eq", "trust": 1.6, "vendor": "francisco burzi", "version": "6.6" }, { "model": "php-nuke", "scope": "eq", "trust": 1.6, "vendor": "francisco burzi", "version": "6.5_rc2" }, { "model": "php-nuke", "scope": "eq", "trust": 1.6, "vendor": "francisco burzi", "version": "6.5_rc3" }, { "model": "php-nuke", "scope": "eq", "trust": 1.6, "vendor": "francisco burzi", "version": "6.5_rc1" }, { "model": "php-nuke", "scope": "eq", "trust": 1.6, "vendor": "francisco burzi", "version": "6.5" }, { "model": "php-nuke", "scope": "eq", "trust": 1.6, "vendor": "francisco burzi", "version": "6.5_beta1" }, { "model": "php-nuke", "scope": "eq", "trust": 1.6, "vendor": "francisco burzi", "version": "7.1" }, { "model": "php-nuke", "scope": "eq", "trust": 1.6, "vendor": "francisco burzi", "version": "6.5_final" }, { "model": "php-nuke", "scope": "eq", "trust": 1.0, "vendor": "francisco burzi", "version": "6.9" }, { "model": "php-nuke", "scope": "eq", "trust": 1.0, "vendor": "francisco burzi", "version": "7.0_final" }, { "model": "php-nuke", "scope": "eq", "trust": 1.0, "vendor": "francisco burzi", "version": "7.0" }, { "model": "php-nuke", "scope": "eq", "trust": 1.0, "vendor": "francisco burzi", "version": "6.7" }, { "model": "burzi php-nuke", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "7.2" }, { "model": "burzi php-nuke", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "7.1" }, { "model": "burzi php-nuke final", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "7.0" }, { "model": "burzi php-nuke", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "7.0" }, { "model": "burzi php-nuke", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "6.9" }, { "model": "burzi php-nuke", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "6.7" }, { "model": "burzi php-nuke", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "6.6" }, { "model": "burzi php-nuke rc3", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "6.5" }, { "model": "burzi php-nuke rc2", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "6.5" }, { "model": "burzi php-nuke rc1", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "6.5" }, { "model": "burzi php-nuke final", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "6.5" }, { "model": "burzi php-nuke beta", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "6.51" }, { "model": "burzi php-nuke", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "6.5" }, { "model": "burzi php-nuke", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "6.0" } ], "sources": [ { "db": "BID", "id": "10128" }, { "db": "CNNVD", "id": "CNNVD-200404-016" }, { "db": "NVD", "id": "CVE-2004-1930" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Janek Vind\u203b come2waraxe@yahoo.com", "sources": [ { "db": "CNNVD", "id": "CNNVD-200404-016" } ], "trust": 0.6 }, "cve": "CVE-2004-1930", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2004-1930", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-10359", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2004-1930", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-200404-016", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-10359", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-10359" }, { "db": "CNNVD", "id": "CNNVD-200404-016" }, { "db": "NVD", "id": "CVE-2004-1930" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cross-site scripting (XSS) vulnerability in the cookiedecode function in mainfile.php for PHP-Nuke 6.x through 7.2, when themes are used, allows remote attackers to inject arbitrary web script or HTML via a base64-encoded user parameter or cookie. Reportedly PHP-NuKe is prone to a remote cross-site scripting vulnerability. This issue is due to a failure of the \u0027cookiedecode()\u0027 function to properly sanitize user supplied cookie parameters. \nThese issues could permit a remote attacker to create a malicious link to the vulnerable application that includes hostile HTML and script code. If this link were followed, the hostile code may be rendered in the web browser of the victim user. This would occur in the security context of the affected web site and may allow for theft of cookie-based authentication credentials or other attacks. PHP-Nuke is a popular website creation and management tool, it can use many database software as backend, such as MySQL, PostgreSQL, mSQL, Interbase, Sybase, etc. The mainfile.php script cookiedecode() function included in PHP-Nuke lacks sufficient filtering for input submitted by users. The \\\u0027\\\u0027cookiedecode()\\\u0027\\\u0027 function incorrectly filters the cookie parameters provided by the user, and the attacker builds a malicious connection to lure the user to visit, which can cause malicious code to be executed on the user\u0027s browser, allowing the attacker to obtain the sensitive information of the target user. information", "sources": [ { "db": "NVD", "id": "CVE-2004-1930" }, { "db": "BID", "id": "10128" }, { "db": "VULHUB", "id": "VHN-10359" } ], "trust": 1.26 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-10359", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-10359" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "10128", "trust": 2.0 }, { "db": "SECUNIA", "id": "11347", "trust": 1.7 }, { "db": "NVD", "id": "CVE-2004-1930", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-200404-016", "trust": 0.7 }, { "db": "XF", "id": "15842", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20040412 [WARAXE-2004-SA#016 - CROSS-SITE SCRIPTING AKA XSS IN PHPNUKE 6.X-7.2 PART 3]", "trust": 0.6 }, { "db": "EXPLOIT-DB", "id": "23990", "trust": 0.1 }, { "db": "SEEBUG", "id": "SSVID-77729", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-10359", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-10359" }, { "db": "BID", "id": "10128" }, { "db": "CNNVD", "id": "CNNVD-200404-016" }, { "db": "NVD", "id": "CVE-2004-1930" } ] }, "id": "VAR-200404-0098", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-10359" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:20:19.868000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2004-1930" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.securityfocus.com/bid/10128" }, { "trust": 1.7, "url": "http://secunia.com/advisories/11347" }, { "trust": 1.6, "url": "http://www.waraxe.us/index.php?modname=sa\u0026id=16" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15842" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=108182759214035\u0026w=2" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/15842" }, { "trust": 0.6, "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=108182759214035\u0026w=2" }, { "trust": 0.3, "url": "http://www.zone.ee/waraxe/?modname=sa\u0026id=016" }, { "trust": 0.3, "url": "http://www.irannuke.com/" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=108182759214035\u0026amp;w=2" }, { "trust": 0.1, "url": "http://www.waraxe.us/index.php?modname=sa\u0026amp;id=16" } ], "sources": [ { "db": "VULHUB", "id": "VHN-10359" }, { "db": "BID", "id": "10128" }, { "db": "CNNVD", "id": "CNNVD-200404-016" }, { "db": "NVD", "id": "CVE-2004-1930" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-10359" }, { "db": "BID", "id": "10128" }, { "db": "CNNVD", "id": "CNNVD-200404-016" }, { "db": "NVD", "id": "CVE-2004-1930" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2004-04-12T00:00:00", "db": "VULHUB", "id": "VHN-10359" }, { "date": "2004-04-13T00:00:00", "db": "BID", "id": "10128" }, { "date": "2004-04-12T00:00:00", "db": "CNNVD", "id": "CNNVD-200404-016" }, { "date": "2004-04-12T04:00:00", "db": "NVD", "id": "CVE-2004-1930" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-07-11T00:00:00", "db": "VULHUB", "id": "VHN-10359" }, { "date": "2004-04-13T00:00:00", "db": "BID", "id": "10128" }, { "date": "2005-10-20T00:00:00", "db": "CNNVD", "id": "CNNVD-200404-016" }, { "date": "2024-11-20T23:52:05.183000", "db": "NVD", "id": "CVE-2004-1930" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200404-016" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "PHP-Nuke CookieDecode Remote cross-site scripting vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-200404-016" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-200404-016" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.