CVE-2007-0896 : Detail

CVE-2007-0896

Cross-site Scripting
A03-Injection
5.61%V3
Network
2007-02-13 10:00 +00:00
2017-07-28 10:57 +00:00

Alert for a CVE

Stay informed of any changes for a specific CVE.
Alert management

Descriptions

Cross-site scripting (XSS) vulnerability in the (1) Sage before 1.3.10, and (2) Sage++ extensions for Firefox, allows remote attackers to inject arbitrary web script or HTML via a "

Exploit information

Exploit Database EDB-ID : 29573

Publication date : 2007-02-08 23:00 +00:00
Author : Fukumori
EDB Verified : Yes

source: https://www.securityfocus.com/bid/22493/info Sage Extension Feed is prone to an HTML-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in dynamically generated content. Hostile HTML and script code may be injected into vulnerable sections of the application. When viewed, this code may be rendered in the browser of a user viewing a malicious RSS feed. Sage Extension Feed 1.3.9 is vulnerable to this issue; prior versions may also be affected. test http://www.example.com/ test test ]]>

Products Mentioned

Configuraton 0

Mozilla>>Firefox >> Version *

Sage>>Sage >> Version *

    Sage>>Sage >> Version To (including) 1.3.9

      Sage>>Sage >> Version 1.0_beta_3

        Sage>>Sage >> Version 1.3.6

          References

          http://osvdb.org/33131
          Tags : vdb-entry, x_refsource_OSVDB
          http://www.securitytracker.com/id?1017624
          Tags : vdb-entry, x_refsource_SECTRACK
          http://jvn.jp/jp/JVN%2384430861/index.html
          Tags : third-party-advisory, x_refsource_JVN
          http://secunia.com/advisories/24086
          Tags : third-party-advisory, x_refsource_SECUNIA
          http://www.securityfocus.com/bid/22493
          Tags : vdb-entry, x_refsource_BID
          Click on the button to the left (OFF), to authorize the inscription of cookie improving the functionalities of the site. Click on the button to the left (Accept all), to unauthorize the inscription of cookie improving the functionalities of the site.