CVE-2006-1590
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
03/04/2006
Last modified:
03/04/2025
Description
Cross-site scripting (XSS) vulnerability in the PrintFreshPage function in (1) Basic Analysis and Security Engine (BASE) 1.2.4 and (2) Analysis Console for Intrusion Databases (ACID) 0.9.6b23 allows remote attackers to inject arbitrary web script or HTML via the (a) back parameter to base_graph_main.php, (b) netmask parameter to base_stat_ipaddr.php, or (c) submit parameter to base_qry_alert.php within BASE, or (d) query string to acid_main.php in ACID, which causes the request URI ($_SERVER['REQUEST_URI']) to be inserted into a refresh operation.
Impact
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:kevin_johnson:basic_analysis_and_security_engine:0.9.7:*:*:*:*:*:*:* | ||
cpe:2.3:a:kevin_johnson:basic_analysis_and_security_engine:0.9.7.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:kevin_johnson:basic_analysis_and_security_engine:0.9.8:*:*:*:*:*:*:* | ||
cpe:2.3:a:kevin_johnson:basic_analysis_and_security_engine:0.9.9:*:*:*:*:*:*:* | ||
cpe:2.3:a:kevin_johnson:basic_analysis_and_security_engine:1.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:kevin_johnson:basic_analysis_and_security_engine:1.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:kevin_johnson:basic_analysis_and_security_engine:1.0.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:kevin_johnson:basic_analysis_and_security_engine:1.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:kevin_johnson:basic_analysis_and_security_engine:1.1.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:kevin_johnson:basic_analysis_and_security_engine:1.1.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:kevin_johnson:basic_analysis_and_security_engine:1.1.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:kevin_johnson:basic_analysis_and_security_engine:1.2.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:kevin_johnson:basic_analysis_and_security_engine:1.2.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:kevin_johnson:basic_analysis_and_security_engine:1.2.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:kevin_johnson:basic_analysis_and_security_engine:1.2.4:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/19544
- http://sourceforge.net/mailarchive/forum.php?thread_id=10064470&forum_id=42223
- http://www.osvdb.org/20835
- http://www.osvdb.org/24307
- http://www.securityfocus.com/bid/17391
- http://www.vupen.com/english/advisories/2006/1264
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25671
- http://secunia.com/advisories/19544
- http://sourceforge.net/mailarchive/forum.php?thread_id=10064470&forum_id=42223
- http://www.osvdb.org/20835
- http://www.osvdb.org/24307
- http://www.securityfocus.com/bid/17391
- http://www.vupen.com/english/advisories/2006/1264
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25671