First published: Sat Apr 09 2005(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in PHP-Nuke 6.x through 7.6 allow remote attackers to inject arbitrary web script or HTML via the (1) username parameter in the Your_Account module, (2) avatarcategory parameter in the Your_Account module, or (3) lid parameter in the Downloads module.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP-Nuke | =6.5_beta1 | |
PHP-Nuke | =6.5 | |
PHP-Nuke | =7.0 | |
PHP-Nuke | =7.4 | |
PHP-Nuke | =7.5 | |
PHP-Nuke | =7.2 | |
PHP-Nuke | =7.0_final | |
PHP-Nuke | =6.5_rc2 | |
PHP-Nuke | =7.3 | |
PHP-Nuke | =6.5_rc3 | |
PHP-Nuke | =7.6 | |
PHP-Nuke | =6.0 | |
PHP-Nuke | =6.5_final | |
PHP-Nuke | =6.7 | |
PHP-Nuke | =6.6 | |
PHP-Nuke | =6.9 | |
PHP-Nuke | =7.1 | |
PHP-Nuke | =6.5_rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-1027 allows remote attackers to perform cross-site scripting (XSS) attacks by injecting arbitrary web scripts or HTML through specific parameters in the PHP-Nuke application.
PHP-Nuke versions 6.0 through 7.6 are affected by CVE-2005-1027.
To mitigate CVE-2005-1027, users should upgrade to a patched version of PHP-Nuke that resolves the XSS vulnerabilities.
The parameters involved in CVE-2005-1027 include 'username' and 'avatarcategory' in the Your_Account module and 'lid' in the Downloads module.
CVE-2005-1027 is considered a significant security issue due to its potential for exploitation via XSS attacks.