First published: Wed Jun 28 2006(Updated: )
Cross-site scripting (XSS) vulnerability in H-Sphere 2.5.1 Beta 1 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) next_template, (2) start, (3) curr_menu_id, and (4) arid parameters in psoft/servlet/resadmin/psoft.hsphere.CP when using the mailman/massmail.html template_name.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Positive Software H-Sphere Winbox | <=2.5.1_beta_1 | |
Positive Software H-Sphere Winbox | =2.5 | |
Positive Software H-Sphere Winbox | =2.5_patch_1 | |
Positive Software H-Sphere Winbox | =2.5_patch_2 | |
Positive Software H-Sphere Winbox | =2.5_rc_3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The CVE-2006-3278 vulnerability is classified as a high-severity cross-site scripting (XSS) issue.
To fix CVE-2006-3278, update to the latest stable version of H-Sphere that addresses this vulnerability.
CVE-2006-3278 affects H-Sphere version 2.5.1 Beta 1 and earlier versions.
CVE-2006-3278 allows attackers to inject arbitrary web scripts or HTML, which can lead to data theft and session hijacking.
Yes, CVE-2006-3278 can be exploited easily by sending crafted requests containing malicious scripts to the vulnerable parameters.