First published: Thu Dec 15 2005(Updated: )
Interpretation conflict in includes/mainfile.php in PHP-Nuke 7.9 and later allows remote attackers to perform cross-site scripting (XSS) attacks by replacing the ">" in the tag with a "<", which bypasses the regular expressions that sanitize the data, but is automatically corrected by many web browsers. NOTE: it could be argued that this vulnerability is due to a design limitation of many web browsers; if so, then this should not be treated as a vulnerability in PHP-Nuke.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Francisco Burzi PHP-Nuke | =7.0 | |
Francisco Burzi PHP-Nuke | =7.2 | |
Francisco Burzi PHP-Nuke | =7.8 | |
Francisco Burzi PHP-Nuke | =7.3 | |
Francisco Burzi PHP-Nuke | =7.6 | |
Francisco Burzi PHP-Nuke | =7.9 | |
Francisco Burzi PHP-Nuke | =7.7 | |
Francisco Burzi PHP-Nuke | =7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.