CVE-2006-0800

medium

Description

Interpretation conflict in PostNuke 0.761 and earlier allows remote attackers to conduct cross-site scripting (XSS) attacks via HTML tags with a trailing "<" character, which is interpreted as a ">" character by some web browsers but bypasses the blacklist protection in (1) the pnVarCleanFromInput function in pnAPI.php, (2) the pnSecureInput function in pnAntiCracker.php, and (3) the htmltext parameter in an edituser operation to user.php.

References

https://exchange.xforce.ibmcloud.com/vulnerabilities/24823

http://www.vupen.com/english/advisories/2006/0673

http://securityreason.com/securityalert/454

http://secunia.com/advisories/18937

http://news.postnuke.com/index.php?name=News&file=article&sid=2754

http://archives.neohapsis.com/archives/fulldisclosure/2006-02/0469.html

Details

Source: Mitre, NVD

Published: 2006-02-20

Updated: 2024-11-21

Risk Information

CVSS v2

Base Score: 2.6

Vector: CVSS2#AV:N/AC:H/Au:N/C:N/I:P/A:N

Severity: Low

CVSS v3

Base Score: 6.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Severity: Medium