First published: Mon Feb 13 2006(Updated: )
Cross-site scripting (XSS) vulnerability in header.php in PHP-Nuke 6.0 to 7.8 allows remote attackers to inject arbitrary web script or HTML via the pagetitle parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP-Nuke | =6.5_beta1 | |
PHP-Nuke | =6.5 | |
PHP-Nuke | =7.0 | |
PHP-Nuke | =7.2 | |
PHP-Nuke | =7.8 | |
PHP-Nuke | =6.5_rc2 | |
PHP-Nuke | =7.3 | |
PHP-Nuke | =6.5_rc3 | |
PHP-Nuke | =7.6 | |
PHP-Nuke | =7.9 | |
PHP-Nuke | =6.0 | |
PHP-Nuke | =7.7 | |
PHP-Nuke | =6.5_final | |
PHP-Nuke | =6.7 | |
PHP-Nuke | =6.6 | |
PHP-Nuke | =6.9 | |
PHP-Nuke | =7.1 | |
PHP-Nuke | =6.5_rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0676 has a medium severity level as it allows for cross-site scripting (XSS) attacks.
To fix CVE-2006-0676, ensure that proper input validation is implemented for the pagetitle parameter in header.php.
CVE-2006-0676 affects PHP-Nuke versions 6.0 through 7.8.
CVE-2006-0676 can be exploited for cross-site scripting attacks, allowing attackers to inject arbitrary web scripts or HTML.
There are no specific patches listed, but upgrading to a fixed version of PHP-Nuke is recommended to mitigate CVE-2006-0676.