CVE-2006-0800
Gravedad CVSS v2.0:
BAJA
Tipo:
CWE-79
Neutralización incorrecta de la entrada durante la generación de la página web (Cross-site Scripting)
Fecha de publicación:
20/02/2006
Última modificación:
03/04/2025
Descripción
*** Pendiente de traducción *** Interpretation conflict in PostNuke 0.761 and earlier allows remote attackers to conduct cross-site scripting (XSS) attacks via HTML tags with a trailing "" character by some web browsers but bypasses the blacklist protection in (1) the pnVarCleanFromInput function in pnAPI.php, (2) the pnSecureInput function in pnAntiCracker.php, and (3) the htmltext parameter in an edituser operation to user.php.
Impacto
Puntuación base 2.0
2.60
Gravedad 2.0
BAJA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:postnuke_software_foundation:postnuke:0.7:*:*:*:*:*:*:* | ||
cpe:2.3:a:postnuke_software_foundation:postnuke:0.62:*:*:*:*:*:*:* | ||
cpe:2.3:a:postnuke_software_foundation:postnuke:0.63:*:*:*:*:*:*:* | ||
cpe:2.3:a:postnuke_software_foundation:postnuke:0.64:*:*:*:*:*:*:* | ||
cpe:2.3:a:postnuke_software_foundation:postnuke:0.70:*:*:*:*:*:*:* | ||
cpe:2.3:a:postnuke_software_foundation:postnuke:0.71:*:*:*:*:*:*:* | ||
cpe:2.3:a:postnuke_software_foundation:postnuke:0.72:*:*:*:*:*:*:* | ||
cpe:2.3:a:postnuke_software_foundation:postnuke:0.73:*:*:*:*:*:*:* | ||
cpe:2.3:a:postnuke_software_foundation:postnuke:0.74:*:*:*:*:*:*:* | ||
cpe:2.3:a:postnuke_software_foundation:postnuke:0.75:*:*:*:*:*:*:* | ||
cpe:2.3:a:postnuke_software_foundation:postnuke:0.75_rc3:*:*:*:*:*:*:* | ||
cpe:2.3:a:postnuke_software_foundation:postnuke:0.76_rc4:*:*:*:*:*:*:* | ||
cpe:2.3:a:postnuke_software_foundation:postnuke:0.76_rc4a:*:*:*:*:*:*:* | ||
cpe:2.3:a:postnuke_software_foundation:postnuke:0.76_rc4b:*:*:*:*:*:*:* | ||
cpe:2.3:a:postnuke_software_foundation:postnuke:0.703:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://archives.neohapsis.com/archives/fulldisclosure/2006-02/0469.html
- http://news.postnuke.com/index.php?name=News&file=article&sid=2754
- http://secunia.com/advisories/18937
- http://securityreason.com/securityalert/454
- http://www.securityfocus.com/bid/16752
- http://www.vupen.com/english/advisories/2006/0673
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24823
- http://archives.neohapsis.com/archives/fulldisclosure/2006-02/0469.html
- http://news.postnuke.com/index.php?name=News&file=article&sid=2754
- http://secunia.com/advisories/18937
- http://securityreason.com/securityalert/454
- http://www.securityfocus.com/bid/16752
- http://www.vupen.com/english/advisories/2006/0673
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24823