First published: Thu Dec 15 2005(Updated: )
Interpretation conflict in includes/mainfile.php in PHP-Nuke 7.9 and later allows remote attackers to perform cross-site scripting (XSS) attacks by replacing the ">" in the tag with a "<", which bypasses the regular expressions that sanitize the data, but is automatically corrected by many web browsers. NOTE: it could be argued that this vulnerability is due to a design limitation of many web browsers; if so, then this should not be treated as a vulnerability in PHP-Nuke.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP-Nuke | =7.0 | |
PHP-Nuke | =7.2 | |
PHP-Nuke | =7.8 | |
PHP-Nuke | =7.3 | |
PHP-Nuke | =7.6 | |
PHP-Nuke | =7.9 | |
PHP-Nuke | =7.7 | |
PHP-Nuke | =7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-4260 is considered a medium severity vulnerability due to its potential for cross-site scripting (XSS) attacks.
To fix CVE-2005-4260, upgrade to a patched version of PHP-Nuke that addresses the XSS vulnerability.
CVE-2005-4260 affects PHP-Nuke versions from 7.0 to 7.9.
Yes, CVE-2005-4260 can allow an attacker to execute malicious scripts in a user's browser through cross-site scripting.
CVE-2005-4260 facilitates cross-site scripting (XSS) attacks, which can lead to session hijacking and data theft.