CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:H/Au:N/C:N/I:P/A:N
AI Score
Confidence
High
EPSS
Percentile
72.0%
Interpretation conflict in PostNuke 0.761 and earlier allows remote attackers to conduct cross-site scripting (XSS) attacks via HTML tags with a trailing “<” character, which is interpreted as a “>” character by some web browsers but bypasses the blacklist protection in (1) the pnVarCleanFromInput function in pnAPI.php, (2) the pnSecureInput function in pnAntiCracker.php, and (3) the htmltext parameter in an edituser operation to user.php.
Vendor | Product | Version | CPE |
---|---|---|---|
postnuke_software_foundation | postnuke | 0.7 | cpe:2.3:a:postnuke_software_foundation:postnuke:0.7:*:*:*:*:*:*:* |
postnuke_software_foundation | postnuke | 0.62 | cpe:2.3:a:postnuke_software_foundation:postnuke:0.62:*:*:*:*:*:*:* |
postnuke_software_foundation | postnuke | 0.63 | cpe:2.3:a:postnuke_software_foundation:postnuke:0.63:*:*:*:*:*:*:* |
postnuke_software_foundation | postnuke | 0.64 | cpe:2.3:a:postnuke_software_foundation:postnuke:0.64:*:*:*:*:*:*:* |
postnuke_software_foundation | postnuke | 0.70 | cpe:2.3:a:postnuke_software_foundation:postnuke:0.70:*:*:*:*:*:*:* |
postnuke_software_foundation | postnuke | 0.71 | cpe:2.3:a:postnuke_software_foundation:postnuke:0.71:*:*:*:*:*:*:* |
postnuke_software_foundation | postnuke | 0.72 | cpe:2.3:a:postnuke_software_foundation:postnuke:0.72:*:*:*:*:*:*:* |
postnuke_software_foundation | postnuke | 0.73 | cpe:2.3:a:postnuke_software_foundation:postnuke:0.73:*:*:*:*:*:*:* |
postnuke_software_foundation | postnuke | 0.74 | cpe:2.3:a:postnuke_software_foundation:postnuke:0.74:*:*:*:*:*:*:* |
postnuke_software_foundation | postnuke | 0.75 | cpe:2.3:a:postnuke_software_foundation:postnuke:0.75:*:*:*:*:*:*:* |
archives.neohapsis.com/archives/fulldisclosure/2006-02/0469.html
news.postnuke.com/index.php?name=News&file=article&sid=2754
secunia.com/advisories/18937
securityreason.com/securityalert/454
www.securityfocus.com/bid/16752
www.vupen.com/english/advisories/2006/0673
exchange.xforce.ibmcloud.com/vulnerabilities/24823