First published: Sat Apr 09 2005(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in PHP-Nuke 6.x to 7.6 allow remote attackers to inject arbitrary web script or HTML via the (1) min parameter to the Search module, (2) the categories parameter to the FAQ module, or (3) the ltr parameter to the Encyclopedia module. NOTE: the bid parameter issue in banners.php is already an item in CVE-2005-1000.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP-Nuke | =6.5_beta1 | |
PHP-Nuke | =6.5 | |
PHP-Nuke | =7.0 | |
PHP-Nuke | =7.4 | |
PHP-Nuke | =7.5 | |
PHP-Nuke | =7.2 | |
PHP-Nuke | =7.0_final | |
PHP-Nuke | =6.5_rc2 | |
PHP-Nuke | =7.3 | |
PHP-Nuke | =6.5_rc3 | |
PHP-Nuke | =7.6 | |
PHP-Nuke | =6.0 | |
PHP-Nuke | =6.5_final | |
PHP-Nuke | =6.7 | |
PHP-Nuke | =6.6 | |
PHP-Nuke | =6.9 | |
PHP-Nuke | =7.1 | |
PHP-Nuke | =6.5_rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-1023 is classified as a medium severity vulnerability due to its ability to execute arbitrary web scripts via cross-site scripting.
To fix CVE-2005-1023, upgrade PHP-Nuke to version 7.7 or later, where the vulnerability has been addressed.
CVE-2005-1023 affects PHP-Nuke versions from 6.x to 7.6, including various beta and release candidates.
The implications of CVE-2005-1023 include the potential for attackers to inject malicious scripts that can compromise user data or session integrity.
While CVE-2005-1023 may not be a concern for applications using updated versions of PHP-Nuke, it remains important for users of older versions to apply necessary patches.