CVE-2006-4794 : Detail

CVE-2006-4794

1.14%V3
Network
2006-09-14
19h00 +00:00
2007-01-10
09h00 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Multiple cross-site scripting (XSS) vulnerabilities in e107 0.7.5 allow remote attackers to inject arbitrary web script or HTML via the query string (PATH_INFO) in (1) contact.php, (2) download.php, (3) admin.php, (4) fpw.php, (5) news.php, (6) search.php, (7) signup.php, (8) submitnews.php, and (9) user.php. NOTE: the provenance of this information is unknown; the details are obtained from third party information.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 4.3 AV:N/AC:M/Au:N/C:N/I:P/A:N nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 28547

Publication date : 2006-09-12 22h00 +00:00
Author : zark0vac
EDB Verified : Yes

source: https://www.securityfocus.com/bid/19997/info e107 CMS is prone to multiple cross-site scripting vulnerabilities because the application fails to sanitize user-supplied input. An attacker may levearge this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. Version 0.7.5 is vulnerable to this issue; other versions may also be affected. http://www,example.com/e107_admin/admin.php/%22%3E%3C/script%3E%3Cscript%3Ealert('founded bypointGLow.com - zark0vac')%3C/script%3E
Exploit Database EDB-ID : 28545

Publication date : 2006-09-12 22h00 +00:00
Author : zark0vac
EDB Verified : Yes

source: https://www.securityfocus.com/bid/19997/info e107 CMS is prone to multiple cross-site scripting vulnerabilities because the application fails to sanitize user-supplied input. An attacker may levearge this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. Version 0.7.5 is vulnerable to this issue; other versions may also be affected. http://www,example.com/contact.php/"><script>alert('founded by pointGLow.com - zark0vac')</script>
Exploit Database EDB-ID : 28546

Publication date : 2006-09-12 22h00 +00:00
Author : zark0vac
EDB Verified : Yes

source: https://www.securityfocus.com/bid/19997/info e107 CMS is prone to multiple cross-site scripting vulnerabilities because the application fails to sanitize user-supplied input. An attacker may levearge this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. Version 0.7.5 is vulnerable to this issue; other versions may also be affected. http://www,example.com/download.php/"><script>alert('founded by pointGLow.com -zark0vac')</script>
Exploit Database EDB-ID : 28548

Publication date : 2006-09-12 22h00 +00:00
Author : zark0vac
EDB Verified : Yes

source: https://www.securityfocus.com/bid/19997/info e107 CMS is prone to multiple cross-site scripting vulnerabilities because the application fails to sanitize user-supplied input. An attacker may levearge this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. Version 0.7.5 is vulnerable to this issue; other versions may also be affected. http://www,example.com/fpw.php/"><script>alert('founded by pointGLow.com - zark0vac')</script>
Exploit Database EDB-ID : 28549

Publication date : 2006-09-12 22h00 +00:00
Author : zark0vac
EDB Verified : Yes

source: https://www.securityfocus.com/bid/19997/info e107 CMS is prone to multiple cross-site scripting vulnerabilities because the application fails to sanitize user-supplied input. An attacker may levearge this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. Version 0.7.5 is vulnerable to this issue; other versions may also be affected. http://www,example.com/news.php/"><script>alert('founded by pointGLow.com - zark0vac')</script>
Exploit Database EDB-ID : 28551

Publication date : 2006-09-12 22h00 +00:00
Author : zark0vac
EDB Verified : Yes

source: https://www.securityfocus.com/bid/19997/info e107 CMS is prone to multiple cross-site scripting vulnerabilities because the application fails to sanitize user-supplied input. An attacker may levearge this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. Version 0.7.5 is vulnerable to this issue; other versions may also be affected. http://www,example.com/search.php/"><script>alert('founded by pointGLow.com - zark0vac')</script>
Exploit Database EDB-ID : 28552

Publication date : 2006-09-12 22h00 +00:00
Author : zark0vac
EDB Verified : Yes

source: https://www.securityfocus.com/bid/19997/info e107 CMS is prone to multiple cross-site scripting vulnerabilities because the application fails to sanitize user-supplied input. An attacker may levearge this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. Version 0.7.5 is vulnerable to this issue; other versions may also be affected. http://www,example.com/signup.php/"><script>alert('founded by pointGLow.com - zark0vac')</script>
Exploit Database EDB-ID : 28554

Publication date : 2006-09-12 22h00 +00:00
Author : zark0vac
EDB Verified : Yes

source: https://www.securityfocus.com/bid/19997/info e107 CMS is prone to multiple cross-site scripting vulnerabilities because the application fails to sanitize user-supplied input. An attacker may levearge this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. Version 0.7.5 is vulnerable to this issue; other versions may also be affected. http://www,example.com/submitnews.php/"><script>alert('founded by pointGLow.com -zark0vac')</script>
Exploit Database EDB-ID : 28556

Publication date : 2006-09-12 22h00 +00:00
Author : zark0vac
EDB Verified : Yes

source: https://www.securityfocus.com/bid/19997/info e107 CMS is prone to multiple cross-site scripting vulnerabilities because the application fails to sanitize user-supplied input. An attacker may levearge this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. Version 0.7.5 is vulnerable to this issue; other versions may also be affected. http://www,example.com/user.php/"><script>alert('founded by pointGLow.com - zark0vac')</script>

Products Mentioned

Configuraton 0

E107>>E107 >> Version 0.7.5

References

http://www.osvdb.org/30982
Tags : vdb-entry, x_refsource_OSVDB
http://www.osvdb.org/30979
Tags : vdb-entry, x_refsource_OSVDB
http://www.osvdb.org/30987
Tags : vdb-entry, x_refsource_OSVDB
http://www.osvdb.org/30983
Tags : vdb-entry, x_refsource_OSVDB
http://www.osvdb.org/30984
Tags : vdb-entry, x_refsource_OSVDB
http://www.osvdb.org/30986
Tags : vdb-entry, x_refsource_OSVDB
http://www.osvdb.org/30985
Tags : vdb-entry, x_refsource_OSVDB
http://www.securityfocus.com/bid/19997
Tags : vdb-entry, x_refsource_BID
http://www.osvdb.org/30981
Tags : vdb-entry, x_refsource_OSVDB
http://www.osvdb.org/30980
Tags : vdb-entry, x_refsource_OSVDB