First published: Thu Mar 09 2006(Updated: )
Cross-site scripting (XSS) vulnerability in Pixelpost 1.5 beta 1 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) message, (2) name, (3) url, and (4) email parameters when commenting on a post. NOTE: the vendor has disputed some issues from the original disclosure, but due to the vagueness of the dispute, it is not clear whether the vendor is disputing this particular issue.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Pixelpost | =1.4.3 | |
Pixelpost | =1.5_beta1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-1106 is classified as a medium severity vulnerability that allows for cross-site scripting (XSS) attacks.
To fix CVE-2006-1106, upgrade Pixelpost to version 1.5 beta 2 or later, which addresses the XSS vulnerability.
CVE-2006-1106 affects Pixelpost versions 1.4.3 and 1.5 beta 1.
CVE-2006-1106 is a cross-site scripting (XSS) vulnerability.
The parameters susceptible to CVE-2006-1106 include message, name, url, and email when commenting on a post.