First published: Mon Feb 20 2006(Updated: )
Interpretation conflict in PostNuke 0.761 and earlier allows remote attackers to conduct cross-site scripting (XSS) attacks via HTML tags with a trailing "<" character, which is interpreted as a ">" character by some web browsers but bypasses the blacklist protection in (1) the pnVarCleanFromInput function in pnAPI.php, (2) the pnSecureInput function in pnAntiCracker.php, and (3) the htmltext parameter in an edituser operation to user.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Postnuke Software Foundation Postnuke | =0.71 | |
Postnuke Software Foundation Postnuke | =0.761 | |
Postnuke Software Foundation Postnuke | =0.63 | |
Postnuke Software Foundation Postnuke | =0.64 | |
Postnuke Software Foundation Postnuke | =0.703 | |
Postnuke Software Foundation Postnuke | =0.76_rc4b | |
Postnuke Software Foundation Postnuke | =0.726.3 | |
Postnuke Software Foundation Postnuke | =0.76_rc4 | |
Postnuke Software Foundation Postnuke | =0.721 | |
Postnuke Software Foundation Postnuke | =0.75_rc3 | |
Postnuke Software Foundation Postnuke | =0.761a | |
Postnuke Software Foundation Postnuke | =0.73 | |
Postnuke Software Foundation Postnuke | =0.74 | |
Postnuke Software Foundation Postnuke | =0.75 | |
Postnuke Software Foundation Postnuke | =0.76_rc4a | |
Postnuke Software Foundation Postnuke | =0.72 | |
Postnuke Software Foundation Postnuke | =0.70 | |
Postnuke Software Foundation Postnuke | =0.62 | |
Postnuke Software Foundation Postnuke | =0.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.