ID OSVDB:39025
Type osvdb
Reporter OSVDB
Modified 2007-07-29T00:00:00
Description
Manual Testing Notes
http://[target]/[path]/lang-en.php?wndtitle=[Xss-script]
References:
Related OSVDB ID: 39024
Related OSVDB ID: 39026
Other Advisory URL: http://securityreason.com/securityalert/2953
Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2007-07/0354.html
ISS X-Force ID: 35663
CVE-2007-4115
Bugtraq ID: 25129
{"bulletinFamily": "software", "viewCount": 0, "reporter": "OSVDB", "references": [], "description": "## Manual Testing Notes\nhttp://[target]/[path]/lang-en.php?wndtitle=[Xss-script]\n## References:\n[Related OSVDB ID: 39024](https://vulners.com/osvdb/OSVDB:39024)\n[Related OSVDB ID: 39026](https://vulners.com/osvdb/OSVDB:39026)\nOther Advisory URL: http://securityreason.com/securityalert/2953\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2007-07/0354.html\nISS X-Force ID: 35663\n[CVE-2007-4115](https://vulners.com/cve/CVE-2007-4115)\nBugtraq ID: 25129\n", "affectedSoftware": [], "href": "https://vulners.com/osvdb/OSVDB:39025", "modified": "2007-07-29T00:00:00", "enchantments": {"score": {"value": 5.7, "vector": "NONE", "modified": "2017-04-28T13:20:34", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2007-4115"]}, {"type": "osvdb", "idList": ["OSVDB:37254", "OSVDB:37255", "OSVDB:39024", "OSVDB:39026", "OSVDB:37256"]}, {"type": "exploitdb", "idList": ["EDB-ID:30433", "EDB-ID:30434", "EDB-ID:30435"]}], "modified": "2017-04-28T13:20:34", "rev": 2}, "vulnersScore": 5.7}, "id": "OSVDB:39025", "title": "IT!CMS (itcms) lang-en.php wndtitle Variable XSS", "edition": 1, "published": "2007-07-29T00:00:00", "type": "osvdb", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "cvelist": ["CVE-2007-4115"], "lastseen": "2017-04-28T13:20:34"}
{"cve": [{"lastseen": "2020-10-03T11:45:53", "description": "Multiple cross-site scripting (XSS) vulnerabilities in IT!CMS (itcms) 0.2 allow remote attackers to inject arbitrary web script or HTML via the wndtitle parameter to (1) lang-en.php, (2) menu-ed.php, or (3) titletext-ed.php.", "edition": 3, "cvss3": {}, "published": "2007-07-31T10:17:00", "title": "CVE-2007-4115", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2007-4115"], "modified": "2018-10-15T21:33:00", "cpe": ["cpe:/a:itcms:itcms:0.2"], "id": "CVE-2007-4115", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-4115", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:a:itcms:itcms:0.2:*:*:*:*:*:*:*"]}], "osvdb": [{"lastseen": "2017-04-28T13:20:34", "bulletinFamily": "software", "cvelist": ["CVE-2007-4115"], "description": "## Manual Testing Notes\nhttp://[target]/[path]/menu-ed.php?wndtitle=[Xss-script]\n## References:\n[Related OSVDB ID: 39025](https://vulners.com/osvdb/OSVDB:39025)\n[Related OSVDB ID: 39026](https://vulners.com/osvdb/OSVDB:39026)\nOther Advisory URL: http://securityreason.com/securityalert/2953\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2007-07/0354.html\nISS X-Force ID: 35663\n[CVE-2007-4115](https://vulners.com/cve/CVE-2007-4115)\nBugtraq ID: 25129\n", "edition": 1, "modified": "2007-07-29T00:00:00", "published": "2007-07-29T00:00:00", "href": "https://vulners.com/osvdb/OSVDB:39024", "id": "OSVDB:39024", "title": "IT!CMS (itcms) menu-ed.php wndtitle Variable XSS", "type": "osvdb", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2017-04-28T13:20:34", "bulletinFamily": "software", "cvelist": ["CVE-2007-4115"], "description": "## Manual Testing Notes\nhttp://[target]/[path]/titletext-ed.php?wndtitle=[Xss-script]\n## References:\n[Related OSVDB ID: 39024](https://vulners.com/osvdb/OSVDB:39024)\n[Related OSVDB ID: 39025](https://vulners.com/osvdb/OSVDB:39025)\nOther Advisory URL: http://securityreason.com/securityalert/2953\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2007-07/0354.html\nISS X-Force ID: 35663\n[CVE-2007-4115](https://vulners.com/cve/CVE-2007-4115)\nBugtraq ID: 25129\n", "edition": 1, "modified": "2007-07-29T00:00:00", "published": "2007-07-29T00:00:00", "href": "https://vulners.com/osvdb/OSVDB:39026", "id": "OSVDB:39026", "title": "IT!CMS (itcms) titletext-ed.php wndtitle Variable XSS", "type": "osvdb", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2017-04-28T13:20:33", "bulletinFamily": "software", "cvelist": ["CVE-2007-4115"], "description": "## Manual Testing Notes\nhttp://[target]/menu-ed.php?wndtitle=[Xss-script]\n## References:\n[Related OSVDB ID: 37254](https://vulners.com/osvdb/OSVDB:37254)\n[Related OSVDB ID: 37256](https://vulners.com/osvdb/OSVDB:37256)\nISS X-Force ID: 35663\n[CVE-2007-4115](https://vulners.com/cve/CVE-2007-4115)\nBugtraq ID: 25129\n", "edition": 1, "modified": "2007-07-30T00:00:00", "published": "2007-07-30T00:00:00", "href": "https://vulners.com/osvdb/OSVDB:37255", "id": "OSVDB:37255", "title": "IT!CMS menu-ed.php wndtitle Variable XSS", "type": "osvdb", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2017-04-28T13:20:33", "bulletinFamily": "software", "cvelist": ["CVE-2007-4115"], "description": "## Manual Testing Notes\nhttp://[target]/lang-en.php?wndtitle=[Xss-script]\n## References:\n[Related OSVDB ID: 37255](https://vulners.com/osvdb/OSVDB:37255)\n[Related OSVDB ID: 37256](https://vulners.com/osvdb/OSVDB:37256)\nISS X-Force ID: 35663\n[CVE-2007-4115](https://vulners.com/cve/CVE-2007-4115)\nBugtraq ID: 25129\n", "edition": 1, "modified": "2007-07-30T00:00:00", "published": "2007-07-30T00:00:00", "href": "https://vulners.com/osvdb/OSVDB:37254", "id": "OSVDB:37254", "title": "IT!CMS lang-en.php wndtitle Variable XSS", "type": "osvdb", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2017-04-28T13:20:33", "bulletinFamily": "software", "cvelist": ["CVE-2007-4115"], "description": "## Manual Testing Notes\nhttp://[target]/titletext-ed.php?wndtitle=[Xss-script]\n## References:\n[Related OSVDB ID: 37255](https://vulners.com/osvdb/OSVDB:37255)\n[Related OSVDB ID: 37254](https://vulners.com/osvdb/OSVDB:37254)\nISS X-Force ID: 35663\n[CVE-2007-4115](https://vulners.com/cve/CVE-2007-4115)\nBugtraq ID: 25129\n", "edition": 1, "modified": "2007-07-30T00:00:00", "published": "2007-07-30T00:00:00", "href": "https://vulners.com/osvdb/OSVDB:37256", "id": "OSVDB:37256", "title": "IT!CMS titletext-ed.php wndtitle Variable XSS", "type": "osvdb", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}], "exploitdb": [{"lastseen": "2016-02-03T12:21:12", "description": "IT!CMS 0.2 lang-en.php wndtitle Parameter XSS. CVE-2007-4115. Webapps exploit for php platform", "published": "2007-07-30T00:00:00", "type": "exploitdb", "title": "IT!CMS 0.2 lang-en.php wndtitle Parameter XSS", "bulletinFamily": "exploit", "cvelist": ["CVE-2007-4115"], "modified": "2007-07-30T00:00:00", "id": "EDB-ID:30433", "href": "https://www.exploit-db.com/exploits/30433/", "sourceData": "source: http://www.securityfocus.com/bid/25129/info\r\n\r\nIT!CMS is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input before using it in dynamically generated content.\r\n\r\nAn attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.\r\n\r\nIT!CMS 0.2 is vulnerable to these issues; other versions may also be affected. \r\n\r\nhttp://www.example.com/lang-en.php?wndtitle=[Xss-script]", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "sourceHref": "https://www.exploit-db.com/download/30433/"}, {"lastseen": "2016-02-03T12:21:20", "description": "IT!CMS 0.2 menu-ed.php wndtitle Parameter XSS. CVE-2007-4115. Webapps exploit for php platform", "published": "2007-07-30T00:00:00", "type": "exploitdb", "title": "IT!CMS 0.2 menu-ed.php wndtitle Parameter XSS", "bulletinFamily": "exploit", "cvelist": ["CVE-2007-4115"], "modified": "2007-07-30T00:00:00", "id": "EDB-ID:30434", "href": "https://www.exploit-db.com/exploits/30434/", "sourceData": "source: http://www.securityfocus.com/bid/25129/info\r\n \r\nIT!CMS is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input before using it in dynamically generated content.\r\n \r\nAn attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.\r\n \r\nIT!CMS 0.2 is vulnerable to these issues; other versions may also be affected.\r\n\r\nhttp://www.example.com/menu-ed.php?wndtitle=[Xss-script]", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "sourceHref": "https://www.exploit-db.com/download/30434/"}, {"lastseen": "2016-02-03T12:21:28", "description": "IT!CMS 0.2 titletext-ed.php wndtitle Parameter XSS. CVE-2007-4115. Webapps exploit for php platform", "published": "2007-07-30T00:00:00", "type": "exploitdb", "title": "IT!CMS 0.2 titletext-ed.php wndtitle Parameter XSS", "bulletinFamily": "exploit", "cvelist": ["CVE-2007-4115"], "modified": "2007-07-30T00:00:00", "id": "EDB-ID:30435", "href": "https://www.exploit-db.com/exploits/30435/", "sourceData": "source: http://www.securityfocus.com/bid/25129/info\r\n \r\nIT!CMS is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input before using it in dynamically generated content.\r\n \r\nAn attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.\r\n \r\nIT!CMS 0.2 is vulnerable to these issues; other versions may also be affected.\r\n\r\nhttp://www.example.com/titletext-ed.php?wndtitle=[Xss-script] ", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "sourceHref": "https://www.exploit-db.com/download/30435/"}]}