First published: Fri Jan 04 2008(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in 2z project 0.9.6.1 allow remote attackers to inject arbitrary web script or HTML via the (1) contentshort or (2) contentfull parameter in an addnews action to the default URI; (3) the content parameter in a pm write action to 2z/admin.php; (4) the referer parameter to templates/default/usermenu.tpl, accessed through index.php; or the (5) newavatar or (6) newphoto parameter in a profile action to the default URI under 2z/.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Array-tools | =0.9.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-6659 has been classified as having moderate severity due to its potential for exploitation through cross-site scripting.
To fix CVE-2007-6659, you should update the 2z project to the latest version that addresses these vulnerabilities.
CVE-2007-6659 affects the 2z project version 0.9.6.1.
CVE-2007-6659 allows remote attackers to perform injection of arbitrary web script or HTML into affected applications.
CVE-2007-6659 involves the contentshort, contentfull, and content parameters which can be exploited during certain actions.