CVE-2006-4794 : Détail

CVE-2006-4794

1.14%V3
Network
2006-09-14
19h00 +00:00
2007-01-10
09h00 +00:00
Notifications pour un CVE
Restez informé de toutes modifications pour un CVE spécifique.
Gestion des notifications

Descriptions du CVE

Multiple cross-site scripting (XSS) vulnerabilities in e107 0.7.5 allow remote attackers to inject arbitrary web script or HTML via the query string (PATH_INFO) in (1) contact.php, (2) download.php, (3) admin.php, (4) fpw.php, (5) news.php, (6) search.php, (7) signup.php, (8) submitnews.php, and (9) user.php. NOTE: the provenance of this information is unknown; the details are obtained from third party information.

Informations du CVE

Métriques

Métriques Score Gravité CVSS Vecteur Source
V2 4.3 AV:N/AC:M/Au:N/C:N/I:P/A:N nvd@nist.gov

EPSS

EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.

Score EPSS

Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.

Percentile EPSS

Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.

Informations sur l'Exploit

Exploit Database EDB-ID : 28547

Date de publication : 2006-09-12 22h00 +00:00
Auteur : zark0vac
EDB Vérifié : Yes

source: https://www.securityfocus.com/bid/19997/info e107 CMS is prone to multiple cross-site scripting vulnerabilities because the application fails to sanitize user-supplied input. An attacker may levearge this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. Version 0.7.5 is vulnerable to this issue; other versions may also be affected. http://www,example.com/e107_admin/admin.php/%22%3E%3C/script%3E%3Cscript%3Ealert('founded bypointGLow.com - zark0vac')%3C/script%3E
Exploit Database EDB-ID : 28545

Date de publication : 2006-09-12 22h00 +00:00
Auteur : zark0vac
EDB Vérifié : Yes

source: https://www.securityfocus.com/bid/19997/info e107 CMS is prone to multiple cross-site scripting vulnerabilities because the application fails to sanitize user-supplied input. An attacker may levearge this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. Version 0.7.5 is vulnerable to this issue; other versions may also be affected. http://www,example.com/contact.php/"><script>alert('founded by pointGLow.com - zark0vac')</script>
Exploit Database EDB-ID : 28546

Date de publication : 2006-09-12 22h00 +00:00
Auteur : zark0vac
EDB Vérifié : Yes

source: https://www.securityfocus.com/bid/19997/info e107 CMS is prone to multiple cross-site scripting vulnerabilities because the application fails to sanitize user-supplied input. An attacker may levearge this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. Version 0.7.5 is vulnerable to this issue; other versions may also be affected. http://www,example.com/download.php/"><script>alert('founded by pointGLow.com -zark0vac')</script>
Exploit Database EDB-ID : 28548

Date de publication : 2006-09-12 22h00 +00:00
Auteur : zark0vac
EDB Vérifié : Yes

source: https://www.securityfocus.com/bid/19997/info e107 CMS is prone to multiple cross-site scripting vulnerabilities because the application fails to sanitize user-supplied input. An attacker may levearge this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. Version 0.7.5 is vulnerable to this issue; other versions may also be affected. http://www,example.com/fpw.php/"><script>alert('founded by pointGLow.com - zark0vac')</script>
Exploit Database EDB-ID : 28549

Date de publication : 2006-09-12 22h00 +00:00
Auteur : zark0vac
EDB Vérifié : Yes

source: https://www.securityfocus.com/bid/19997/info e107 CMS is prone to multiple cross-site scripting vulnerabilities because the application fails to sanitize user-supplied input. An attacker may levearge this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. Version 0.7.5 is vulnerable to this issue; other versions may also be affected. http://www,example.com/news.php/"><script>alert('founded by pointGLow.com - zark0vac')</script>
Exploit Database EDB-ID : 28551

Date de publication : 2006-09-12 22h00 +00:00
Auteur : zark0vac
EDB Vérifié : Yes

source: https://www.securityfocus.com/bid/19997/info e107 CMS is prone to multiple cross-site scripting vulnerabilities because the application fails to sanitize user-supplied input. An attacker may levearge this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. Version 0.7.5 is vulnerable to this issue; other versions may also be affected. http://www,example.com/search.php/"><script>alert('founded by pointGLow.com - zark0vac')</script>
Exploit Database EDB-ID : 28552

Date de publication : 2006-09-12 22h00 +00:00
Auteur : zark0vac
EDB Vérifié : Yes

source: https://www.securityfocus.com/bid/19997/info e107 CMS is prone to multiple cross-site scripting vulnerabilities because the application fails to sanitize user-supplied input. An attacker may levearge this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. Version 0.7.5 is vulnerable to this issue; other versions may also be affected. http://www,example.com/signup.php/"><script>alert('founded by pointGLow.com - zark0vac')</script>
Exploit Database EDB-ID : 28554

Date de publication : 2006-09-12 22h00 +00:00
Auteur : zark0vac
EDB Vérifié : Yes

source: https://www.securityfocus.com/bid/19997/info e107 CMS is prone to multiple cross-site scripting vulnerabilities because the application fails to sanitize user-supplied input. An attacker may levearge this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. Version 0.7.5 is vulnerable to this issue; other versions may also be affected. http://www,example.com/submitnews.php/"><script>alert('founded by pointGLow.com -zark0vac')</script>
Exploit Database EDB-ID : 28556

Date de publication : 2006-09-12 22h00 +00:00
Auteur : zark0vac
EDB Vérifié : Yes

source: https://www.securityfocus.com/bid/19997/info e107 CMS is prone to multiple cross-site scripting vulnerabilities because the application fails to sanitize user-supplied input. An attacker may levearge this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. Version 0.7.5 is vulnerable to this issue; other versions may also be affected. http://www,example.com/user.php/"><script>alert('founded by pointGLow.com - zark0vac')</script>

Products Mentioned

Configuraton 0

E107>>E107 >> Version 0.7.5

Références

http://www.osvdb.org/30982
Tags : vdb-entry, x_refsource_OSVDB
http://www.osvdb.org/30979
Tags : vdb-entry, x_refsource_OSVDB
http://www.osvdb.org/30987
Tags : vdb-entry, x_refsource_OSVDB
http://www.osvdb.org/30983
Tags : vdb-entry, x_refsource_OSVDB
http://www.osvdb.org/30984
Tags : vdb-entry, x_refsource_OSVDB
http://www.osvdb.org/30986
Tags : vdb-entry, x_refsource_OSVDB
http://www.osvdb.org/30985
Tags : vdb-entry, x_refsource_OSVDB
http://www.securityfocus.com/bid/19997
Tags : vdb-entry, x_refsource_BID
http://www.osvdb.org/30981
Tags : vdb-entry, x_refsource_OSVDB
http://www.osvdb.org/30980
Tags : vdb-entry, x_refsource_OSVDB