First published: Mon Feb 20 2006(Updated: )
Interpretation conflict in PostNuke 0.761 and earlier allows remote attackers to conduct cross-site scripting (XSS) attacks via HTML tags with a trailing "<" character, which is interpreted as a ">" character by some web browsers but bypasses the blacklist protection in (1) the pnVarCleanFromInput function in pnAPI.php, (2) the pnSecureInput function in pnAntiCracker.php, and (3) the htmltext parameter in an edituser operation to user.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Postnuke Software Foundation Pnphpbb | =0.7 | |
Postnuke Software Foundation Pnphpbb | =0.62 | |
Postnuke Software Foundation Pnphpbb | =0.63 | |
Postnuke Software Foundation Pnphpbb | =0.64 | |
Postnuke Software Foundation Pnphpbb | =0.70 | |
Postnuke Software Foundation Pnphpbb | =0.71 | |
Postnuke Software Foundation Pnphpbb | =0.72 | |
Postnuke Software Foundation Pnphpbb | =0.73 | |
Postnuke Software Foundation Pnphpbb | =0.74 | |
Postnuke Software Foundation Pnphpbb | =0.75 | |
Postnuke Software Foundation Pnphpbb | =0.75_rc3 | |
Postnuke Software Foundation Pnphpbb | =0.76_rc4 | |
Postnuke Software Foundation Pnphpbb | =0.76_rc4a | |
Postnuke Software Foundation Pnphpbb | =0.76_rc4b | |
Postnuke Software Foundation Pnphpbb | =0.703 | |
Postnuke Software Foundation Pnphpbb | =0.721 | |
Postnuke Software Foundation Pnphpbb | =0.726.3 | |
Postnuke Software Foundation Pnphpbb | =0.761 | |
Postnuke Software Foundation Pnphpbb | =0.761a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0800 is classified as a medium severity vulnerability due to its potential for allowing cross-site scripting attacks.
To fix CVE-2006-0800, upgrade to a fixed version of PostNuke that addresses this vulnerability, specifically versions later than 0.761.
CVE-2006-0800 affects PostNuke versions 0.71, 0.63, 0.64, 0.703, 0.761, and several 0.76 release candidates and earlier.
CVE-2006-0800 allows attackers to perform cross-site scripting (XSS) attacks, potentially leading to session hijacking and data manipulation.
Yes, CVE-2006-0800 exploits a flaw in user input sanitation, allowing HTML tags with a trailing '<' to bypass blacklist protections.