First published: Mon Feb 28 2005(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in the Download module for PostNuke 0.750 and 0.760-RC2 allow remote attackers to inject arbitrary web script or HTML via the (1) Program name, (2) File link, (3) Author name (4) Author e-mail address, (5) File size, (6) Version, or (7) Home page variables.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PostNuke | =0.750 | |
PostNuke | =0.760_rc2 | |
PostNuke | =0.750 | |
PostNuke | =0.760_rc2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0616 includes XSS vulnerabilities that allow injection of arbitrary web scripts through several fields like Program name, File link, Author name, Author e-mail address, File size, Version, or Home page.
PostNuke versions 0.750 and 0.760-RC2 are affected by the vulnerabilities identified in CVE-2005-0616.
Mitigating the risks of CVE-2005-0616 requires validating and sanitizing user inputs in the affected fields to prevent script injection.
Exploitation of CVE-2005-0616 can allow remote attackers to execute malicious scripts in the context of a user's browser, potentially leading to data theft or account compromise.
There are no specific patches provided for CVE-2005-0616, but upgrading to a secure and up-to-date version of PostNuke is recommended to address security vulnerabilities.