2.6
CVSSv2

CVE-2006-0800

Published: 20/02/2006 Updated: 20/07/2017
CVSS v2 Base Score: 2.6 | Impact Score: 2.9 | Exploitability Score: 4.9
VMScore: 265
Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N

Vulnerability Summary

Interpretation conflict in PostNuke 0.761 and previous versions allows remote malicious users to conduct cross-site scripting (XSS) attacks via HTML tags with a trailing "<" character, which is interpreted as a ">" character by some web browsers but bypasses the blacklist protection in (1) the pnVarCleanFromInput function in pnAPI.php, (2) the pnSecureInput function in pnAntiCracker.php, and (3) the htmltext parameter in an edituser operation to user.php.

Vulnerable Product Search on Vulmon Subscribe to Product

postnuke software foundation postnuke 0.71

postnuke software foundation postnuke 0.72

postnuke software foundation postnuke 0.76_rc4

postnuke software foundation postnuke 0.76_rc4a

postnuke software foundation postnuke 0.63

postnuke software foundation postnuke 0.64

postnuke software foundation postnuke 0.73

postnuke software foundation postnuke 0.74

postnuke software foundation postnuke 0.761a

postnuke software foundation postnuke 0.62

postnuke software foundation postnuke 0.721

postnuke software foundation postnuke 0.726.3

postnuke software foundation postnuke 0.76_rc4b

postnuke software foundation postnuke 0.761

postnuke software foundation postnuke 0.7

postnuke software foundation postnuke 0.70

postnuke software foundation postnuke 0.703

postnuke software foundation postnuke 0.75

postnuke software foundation postnuke 0.75_rc3

Exploits

source: wwwsecurityfocuscom/bid/16752/info PostNuke is prone to multiple input-validation vulnerabilities These issues are due to the application's failure to properly sanitize user-supplied input Successful exploitation could allow an attacker to compromise the application, access or modify data, steal cookie-based authentication cre ...