Required CVE Record Information
Description
Interpretation conflict in PostNuke 0.761 and earlier allows remote attackers to conduct cross-site scripting (XSS) attacks via HTML tags with a trailing "<" character, which is interpreted as a ">" character by some web browsers but bypasses the blacklist protection in (1) the pnVarCleanFromInput function in pnAPI.php, (2) the pnSecureInput function in pnAntiCracker.php, and (3) the htmltext parameter in an edituser operation to user.php.
References 7 Total
- vupen.com: ADV-2006-0673 vdb-entry
- exchange.xforce.ibmcloud.com: postnuke-user-nslanguages-xss(24823) vdb-entry
- securityfocus.com: 16752 vdb-entry
- http://news.postnuke.com/index.php?name=News&file=article&sid=2754
- archives.neohapsis.com: 20060219 Multiple vulnerabilities in PostNuke <= 0.761 mailing-list
- secunia.com: 18937 third-party-advisory
- securityreason.com: 454 third-party-advisory
Updated:
This container includes required additional information provided by the CVE Program for this vulnerability.
References 7 Total
- vupen.com: ADV-2006-0673 vdb-entryx_transferred
- exchange.xforce.ibmcloud.com: postnuke-user-nslanguages-xss(24823) vdb-entryx_transferred
- securityfocus.com: 16752 vdb-entryx_transferred
- http://news.postnuke.com/index.php?name=News&file=article&sid=2754 x_transferred
- archives.neohapsis.com: 20060219 Multiple vulnerabilities in PostNuke <= 0.761 mailing-listx_transferred
- secunia.com: 18937 third-party-advisoryx_transferred
- securityreason.com: 454 third-party-advisoryx_transferred