First published: Mon Dec 31 2001(Updated: )
Cross-site scripting (XSS) vulnerability in PHP-Nuke 5.3.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) uname parameter in user.php, (2) ttitle, letter and file parameters in modules.php, (3) subject, story and storyext parameters in submit.php, (4) upload parameter in admin.php and (5) fname parameter in friend.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP-Nuke | =3.0 | |
PHP-Nuke | =4.0 | |
PHP-Nuke | =4.3 | |
PHP-Nuke | =4.4 | |
PHP-Nuke | =4.4.1a | |
PHP-Nuke | =5.0 | |
PHP-Nuke | =5.0.1 | |
PHP-Nuke | =5.1 | |
PHP-Nuke | =5.2 | |
PHP-Nuke | =5.2a | |
PHP-Nuke | =5.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-1524 is classified as a high severity vulnerability due to its potential for allowing remote attackers to execute arbitrary scripts.
To fix CVE-2001-1524, upgrade PHP-Nuke to version 5.3.2 or later that resolves this XSS vulnerability.
CVE-2001-1524 affects PHP-Nuke versions 5.3.1 and earlier.
CVE-2001-1524 exploits parameters such as uname in user.php and ttitle, letter, and file in modules.php for XSS attacks.
Yes, CVE-2001-1524 can potentially lead to data theft since it allows attackers to inject malicious scripts into web pages.