CVE-2006-2635 : Detail

CVE-2006-2635

Cross-site Scripting
A03-Injection
11.9%V4
Network
2006-05-30
08h00 +00:00
2018-10-18
12h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Multiple cross-site scripting (XSS) vulnerabilities in Tikiwiki (aka Tiki CMS/Groupware) 1.9.x allow remote attackers to inject arbitrary web script or HTML via malformed nested HTML tags such as "ipt>" in (1) offset and (2) days parameters in (a) tiki-lastchanges.php, the (3) find and (4) offset parameters in (b) tiki-orphan_pages.php, the (5) offset and (6) initial parameters in (c) tiki-listpages.php, and (7) an unspecified field in (d) tiki-remind_password.php; and allow remote authenticated users with admin privileges to inject arbitrary web script or HTML via (8) an unspecified field in a metatags action in (e) tiki-admin.php, the (9) offset parameter in (f) tiki-admin_rssmodules.php, the (10) offset and (11) max parameters in (g) tiki-syslog.php, the (12) numrows parameter in (h) tiki-adminusers.php, (13) an unspecified field in (i) tiki-adminusers.php, (14) an unspecified field in (j) tiki-admin_hotwords.php, unspecified fields in (15) "Assign new module" and (16) "Create new user module" in (k) tiki-admin_modules.php, (17) an unspecified field in "Add notification" in (l) tiki-admin_notifications.php, (18) the offset parameter in (m) tiki-admin_notifications.php, the (19) Name and (20) Dsn fields in (o) tiki-admin_dsn.php, the (21) offset parameter in (p) tiki-admin_content_templates.php, (22) an unspecified field in "Create new template" in (q) tiki-admin_content_templates.php, and the (23) offset parameter in (r) tiki-admin_chat.php.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.

Metrics

Metrics Score Severity CVSS Vector Source
V2 4.3 AV:N/AC:M/Au:N/C:N/I:P/A:N nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 27917

Publication date : 2006-05-28 22h00 +00:00
Author : Blwood
EDB Verified : Yes

Products Mentioned

Configuraton 0

Tiki>>Tikiwiki_cms\/groupware >> Version 1.9.0

Tiki>>Tikiwiki_cms\/groupware >> Version 1.9.0

Tiki>>Tikiwiki_cms\/groupware >> Version 1.9.0

Tiki>>Tikiwiki_cms\/groupware >> Version 1.9.0

Tiki>>Tikiwiki_cms\/groupware >> Version 1.9.1

Tiki>>Tikiwiki_cms\/groupware >> Version 1.9.2

Tiki>>Tikiwiki_cms\/groupware >> Version 1.9.3

Tiki>>Tikiwiki_cms\/groupware >> Version 1.9.3.1

Tiki>>Tikiwiki_cms\/groupware >> Version 1.9.3.2

Tiki>>Tikiwiki_cms\/groupware >> Version 1.9.4

Tiki>>Tikiwiki_cms\/groupware >> Version 1.9.5

Tiki>>Tikiwiki_cms\/groupware >> Version 1.9.6

Tiki>>Tikiwiki_cms\/groupware >> Version 1.9.7

Tiki>>Tikiwiki_cms\/groupware >> Version 1.9.8

Tiki>>Tikiwiki_cms\/groupware >> Version 1.9.8.1

Tiki>>Tikiwiki_cms\/groupware >> Version 1.9.9

Tiki>>Tikiwiki_cms\/groupware >> Version 1.9.10

Tiki>>Tikiwiki_cms\/groupware >> Version 1.9.11

References

http://www.securityfocus.com/bid/18143
Tags : vdb-entry, x_refsource_BID
http://www.osvdb.org/26050
Tags : vdb-entry, x_refsource_OSVDB
http://www.osvdb.org/26059
Tags : vdb-entry, x_refsource_OSVDB
http://www.osvdb.org/26061
Tags : vdb-entry, x_refsource_OSVDB
http://www.osvdb.org/26053
Tags : vdb-entry, x_refsource_OSVDB
http://www.osvdb.org/26060
Tags : vdb-entry, x_refsource_OSVDB
http://www.osvdb.org/26056
Tags : vdb-entry, x_refsource_OSVDB
http://www.osvdb.org/26054
Tags : vdb-entry, x_refsource_OSVDB
http://www.osvdb.org/26051
Tags : vdb-entry, x_refsource_OSVDB
http://www.vupen.com/english/advisories/2006/2024
Tags : vdb-entry, x_refsource_VUPEN
http://www.osvdb.org/26062
Tags : vdb-entry, x_refsource_OSVDB
http://securityreason.com/securityalert/976
Tags : third-party-advisory, x_refsource_SREASON
http://www.osvdb.org/26057
Tags : vdb-entry, x_refsource_OSVDB
http://secunia.com/advisories/20334
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.osvdb.org/26052
Tags : vdb-entry, x_refsource_OSVDB
http://www.osvdb.org/26058
Tags : vdb-entry, x_refsource_OSVDB
http://www.osvdb.org/26048
Tags : vdb-entry, x_refsource_OSVDB
http://www.osvdb.org/26049
Tags : vdb-entry, x_refsource_OSVDB
http://www.osvdb.org/26055
Tags : vdb-entry, x_refsource_OSVDB