CVE-2009-3444 : Detail

CVE-2009-3444

Cross-site Scripting
A03-Injection
0.76%V3
Network
2009-09-28
20h00 +00:00
2018-10-10
16h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Cross-site scripting (XSS) vulnerability in email.php in e107 0.7.16 and earlier allows remote attackers to inject arbitrary web script or HTML via the HTTP Referer header in a news.1 (aka news to email) action.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.

Metrics

Metrics Score Severity CVSS Vector Source
V2 4.3 AV:N/AC:M/Au:N/C:N/I:P/A:N nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 9825

Publication date : 2009-09-23 22h00 +00:00
Author : MustLive
EDB Verified : Yes

Hello Bugtraq! I want to warn you about Cross-Site Scripting vulnerability in E107. Which I found at 31.01.2009 and disclosed recently. XSS: At page for sending news to email (http://site/email.php?news.1) it's possible to conduct XSS attack via Referer header. Particularly it can be done via flash. Referer: '><script>alert(document.cookie)</script> Vulnerable are E107 0.7.16 and previous versions (all versions). I mentioned about this vulnerability at my site (http://websecurity.com.ua/3528/). Best wishes & regards, MustLive Administrator of Websecurity web site http://websecurity.com.ua

Products Mentioned

Configuraton 0

E107>>E107 >> Version To (including) 0.7.16

E107>>E107 >> Version 0.6_10

    E107>>E107 >> Version 0.6_11

      E107>>E107 >> Version 0.6_12

        E107>>E107 >> Version 0.6_13

          E107>>E107 >> Version 0.6_14

            E107>>E107 >> Version 0.6_15

              E107>>E107 >> Version 0.6_15a

                E107>>E107 >> Version 0.7

                E107>>E107 >> Version 0.7.1

                E107>>E107 >> Version 0.7.2

                E107>>E107 >> Version 0.7.3

                E107>>E107 >> Version 0.7.4

                E107>>E107 >> Version 0.7.5

                E107>>E107 >> Version 0.7.6

                E107>>E107 >> Version 0.7.7

                E107>>E107 >> Version 0.7.8

                E107>>E107 >> Version 0.7.9

                E107>>E107 >> Version 0.7.10

                E107>>E107 >> Version 0.7.11

                E107>>E107 >> Version 0.7.12

                E107>>E107 >> Version 0.7.13

                E107>>E107 >> Version 0.7.14

                E107>>E107 >> Version 0.7.15

                E107>>E107 >> Version 0.545

                  E107>>E107 >> Version 0.547_beta

                    E107>>E107 >> Version 0.548_beta

                      E107>>E107 >> Version 0.549_beta

                        E107>>E107 >> Version 0.551_beta

                          E107>>E107 >> Version 0.552_beta

                            E107>>E107 >> Version 0.553_beta

                              E107>>E107 >> Version 0.554

                                E107>>E107 >> Version 0.554_beta

                                  E107>>E107 >> Version 0.555_beta

                                    E107>>E107 >> Version 0.600

                                    E107>>E107 >> Version 0.601

                                    E107>>E107 >> Version 0.602

                                    E107>>E107 >> Version 0.603

                                    E107>>E107 >> Version 0.604

                                    E107>>E107 >> Version 0.605

                                    E107>>E107 >> Version 0.606

                                    E107>>E107 >> Version 0.607

                                    E107>>E107 >> Version 0.608

                                    E107>>E107 >> Version 0.609

                                    E107>>E107 >> Version 0.610

                                    E107>>E107 >> Version 0.611

                                    E107>>E107 >> Version 0.612

                                    E107>>E107 >> Version 0.613

                                    E107>>E107 >> Version 0.614

                                    E107>>E107 >> Version 0.615

                                    E107>>E107 >> Version 0.615a

                                    E107>>E107 >> Version 0.616

                                    E107>>E107 >> Version 0.617

                                    E107>>E107 >> Version 0.6171

                                    E107>>E107 >> Version 0.6172

                                    E107>>E107 >> Version 0.6173

                                    E107>>E107 >> Version 0.6174

                                    E107>>E107 >> Version 0.6175

                                    References

                                    http://secunia.com/advisories/36832
                                    Tags : third-party-advisory, x_refsource_SECUNIA
                                    http://websecurity.com.ua/3528
                                    Tags : x_refsource_MISC
                                    http://osvdb.org/58363
                                    Tags : vdb-entry, x_refsource_OSVDB
                                    http://www.securityfocus.com/bid/36517
                                    Tags : vdb-entry, x_refsource_BID
                                    http://www.securitytracker.com/id?1022947
                                    Tags : vdb-entry, x_refsource_SECTRACK