CVE-2005-0443 : Detail

CVE-2005-0443

0.92%V4
Network
2005-02-15
04h00 +00:00
2017-07-10
12h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

index.php in CubeCart 2.0.4 allows remote attackers to (1) obtain the full path for the web server or (2) conduct cross-site scripting (XSS) attacks via an invalid language parameter, which echoes the parameter in a PHP error message.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 4.3 AV:N/AC:M/Au:N/C:P/I:N/A:N nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 25097

Publication date : 2005-02-13 23h00 +00:00
Author : John Cobb
EDB Verified : Yes

source: https://www.securityfocus.com/bid/12549/info Brooky CubeCart is reported prone to multiple vulnerabilities. These issues result from insufficient sanitization of user-supplied data and may allow remote attackers to disclose arbitrary files and carry out cross-site scripting attacks. The application is reportedly susceptible to a remote directory traversal vulnerability. A malicious user could issue a request containing directory traversal strings such as '../' to possibly view files outside the server root directory in the context of the server. The application is also prone to a cross-site scripting vulnerability. This issue is due to a failure of the application to properly sanitize user-supplied URI input. This may allow for theft of cookie-based authentication credentials or other attacks. CubeCart 2.0.4 and prior versions are considered to be vulnerable to these issues. http://www.example.com/index.php?&language=<script>var%20test_variable=31 337;alert(test_variable);</script>

Products Mentioned

Configuraton 0

Devellion>>Cubecart >> Version 2.0.1

    Devellion>>Cubecart >> Version 2.0.4

      References

      http://www.osvdb.org/14064
      Tags : vdb-entry, x_refsource_OSVDB
      http://www.securityfocus.com/bid/12549
      Tags : vdb-entry, x_refsource_BID
      http://marc.info/?l=bugtraq&m=110842125901191&w=2
      Tags : mailing-list, x_refsource_BUGTRAQ