First published: Thu Dec 07 2006(Updated: )
Cross-site scripting (XSS) vulnerability in includes/elements/spellcheck/spellwin.php in Cerberus Helpdesk 0.97.3, 2.0 through 2.7, 3.2.1, and 3.3 allows remote attackers to inject arbitrary web script or HTML via the js parameter. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Webgroupmedia Cerberus Helpdesk | =3.2.1 | |
Webgroupmedia Cerberus Helpdesk | =2.7 | |
Webgroupmedia Cerberus Helpdesk | =3.3 | |
Webgroupmedia Cerberus Helpdesk | =2.5 | |
Webgroupmedia Cerberus Helpdesk | =3.2.317 | |
Webgroupmedia Cerberus Helpdesk | =2.3 | |
Webgroupmedia Cerberus Helpdesk | =2.4 | |
Webgroupmedia Cerberus Helpdesk | =2.2 | |
Webgroupmedia Cerberus Helpdesk | =2.1 | |
Webgroupmedia Cerberus Helpdesk | =2.0 | |
Webgroupmedia Cerberus Helpdesk | =2.6.1 | |
Webgroupmedia Cerberus Helpdesk | =2.7.1 | |
Webgroupmedia Cerberus Helpdesk | =0.97.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-6366 is classified as a moderate severity cross-site scripting vulnerability.
To fix CVE-2006-6366, upgrade your Cerberus Helpdesk installation to the latest version or apply any available security patches.
CVE-2006-6366 affects Cerberus Helpdesk versions from 0.97.3 to 3.3, including 2.0 through 2.7.
CVE-2006-6366 allows remote attackers to inject arbitrary web scripts or HTML via the js parameter.
Yes, CVE-2006-6366 is easily exploitable due to its reliance on user input without proper sanitization.