ID

VAR-200112-0177


CVE

CVE-2001-1524


TITLE

PHPNuke Multiple cross-site scripting vulnerabilities

Trust: 0.6

sources: CNNVD: CNNVD-200112-201

DESCRIPTION

Cross-site scripting (XSS) vulnerability in PHP-Nuke 5.3.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) uname parameter in user.php, (2) ttitle, letter and file parameters in modules.php, (3) subject, story and storyext parameters in submit.php, (4) upload parameter in admin.php and (5) fname parameter in friend.php. PHPNuke is a website creation/maintenance tool. PHPNuke is prone to cross-site scripting attacks. It is possible to create a link to the PHPNuke user information page, 'user.php', which contains malicious script code. When the link is clicked by an unsuspecting web user, the malicious script code will be executed on the user in the context of the site running PHPNuke. This attack may be used to steal a user's cookie-based authentication credentials for the vulnerable PHPNuke site. PostNuke is also affected by a number of these issues. This problem has also been reported with other scripts included in the PHPNuke package. More specifically, modules.php, upload.php, friend.php and submit.php are also vulnerable under some circumstances. Different parameters to the user.php script may also be sufficient for a cross-site scripting attack. An additional cross-site scripting vulnerability has been reported in modules.php for PostNuke. **It has been reported that the cross-site scripting issue affecting the 'ttitle' parameter of 'modules.php' script has been re-introduced in newer versions of the PHPNuke application. This issue is reported to affect versions 7.2 and prior

Trust: 1.26

sources: NVD: CVE-2001-1524 // BID: 3609 // VULHUB: VHN-4325

AFFECTED PRODUCTS

vendor:francisco burzimodel:php-nukescope:eqversion:4.4

Trust: 1.6

vendor:francisco burzimodel:php-nukescope:eqversion:5.2

Trust: 1.6

vendor:francisco burzimodel:php-nukescope:eqversion:5.1

Trust: 1.6

vendor:francisco burzimodel:php-nukescope:eqversion:5.0

Trust: 1.6

vendor:francisco burzimodel:php-nukescope:eqversion:4.4.1a

Trust: 1.6

vendor:francisco burzimodel:php-nukescope:eqversion:5.0.1

Trust: 1.6

vendor:francisco burzimodel:php-nukescope:eqversion:3.0

Trust: 1.6

vendor:francisco burzimodel:php-nukescope:eqversion:4.3

Trust: 1.6

vendor:francisco burzimodel:php-nukescope:eqversion:5.3.1

Trust: 1.6

vendor:francisco burzimodel:php-nukescope:eqversion:5.2a

Trust: 1.6

vendor:francisco burzimodel:php-nukescope:eqversion:4.0

Trust: 1.0

vendor:postnukemodel:development team postnukescope:eqversion:0.64

Trust: 0.3

vendor:postnukemodel:development team postnukescope:eqversion:0.63

Trust: 0.3

vendor:postnukemodel:development team postnukescope:eqversion:0.62

Trust: 0.3

vendor:franciscomodel:burzi php-nukescope:eqversion:7.2

Trust: 0.3

vendor:franciscomodel:burzi php-nukescope:eqversion:7.1

Trust: 0.3

vendor:franciscomodel:burzi php-nuke finalscope:eqversion:7.0

Trust: 0.3

vendor:franciscomodel:burzi php-nukescope:eqversion:7.0

Trust: 0.3

vendor:franciscomodel:burzi php-nukescope:eqversion:6.9

Trust: 0.3

vendor:franciscomodel:burzi php-nukescope:eqversion:6.7

Trust: 0.3

vendor:franciscomodel:burzi php-nukescope:eqversion:6.6

Trust: 0.3

vendor:franciscomodel:burzi php-nuke rc3scope:eqversion:6.5

Trust: 0.3

vendor:franciscomodel:burzi php-nuke rc2scope:eqversion:6.5

Trust: 0.3

vendor:franciscomodel:burzi php-nuke rc1scope:eqversion:6.5

Trust: 0.3

vendor:franciscomodel:burzi php-nuke finalscope:eqversion:6.5

Trust: 0.3

vendor:franciscomodel:burzi php-nuke betascope:eqversion:6.51

Trust: 0.3

vendor:franciscomodel:burzi php-nukescope:eqversion:6.5

Trust: 0.3

vendor:franciscomodel:burzi php-nukescope:eqversion:6.0

Trust: 0.3

vendor:franciscomodel:burzi php-nukescope:eqversion:5.3.1

Trust: 0.3

vendor:franciscomodel:burzi php-nuke ascope:eqversion:5.2

Trust: 0.3

vendor:franciscomodel:burzi php-nukescope:eqversion:5.2

Trust: 0.3

vendor:franciscomodel:burzi php-nukescope:eqversion:5.1

Trust: 0.3

vendor:franciscomodel:burzi php-nukescope:eqversion:5.0.1

Trust: 0.3

vendor:franciscomodel:burzi php-nukescope:eqversion:5.0

Trust: 0.3

vendor:franciscomodel:burzi php-nuke ascope:eqversion:4.4.1

Trust: 0.3

vendor:franciscomodel:burzi php-nukescope:eqversion:4.4

Trust: 0.3

vendor:franciscomodel:burzi php-nukescope:eqversion:4.3

Trust: 0.3

vendor:franciscomodel:burzi php-nukescope:eqversion:4.0

Trust: 0.3

vendor:franciscomodel:burzi php-nukescope:eqversion:3.0

Trust: 0.3

vendor:franciscomodel:burzi php-nukescope:eqversion:2.5

Trust: 0.3

vendor:franciscomodel:burzi php-nukescope:eqversion:1.0

Trust: 0.3

vendor:postnukemodel:development team postnukescope:neversion:0.71

Trust: 0.3

vendor:franciscomodel:burzi php-nukescope:neversion:5.5

Trust: 0.3

vendor:franciscomodel:burzi php-nukescope:neversion:5.4

Trust: 0.3

sources: BID: 3609 // CNNVD: CNNVD-200112-201 // NVD: CVE-2001-1524

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2001-1524
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-200112-201
value: MEDIUM

Trust: 0.6

VULHUB: VHN-4325
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2001-1524
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-4325
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-4325 // CNNVD: CNNVD-200112-201 // NVD: CVE-2001-1524

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2001-1524

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200112-201

TYPE

XSS

Trust: 0.6

sources: CNNVD: CNNVD-200112-201

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-4325

EXTERNAL IDS

db:BIDid:3609

Trust: 2.0

db:NVDid:CVE-2001-1524

Trust: 1.7

db:CNNVDid:CNNVD-200112-201

Trust: 0.7

db:XFid:7654

Trust: 0.6

db:EXPLOIT-DBid:21165

Trust: 0.1

db:EXPLOIT-DBid:21166

Trust: 0.1

db:SEEBUGid:SSVID-75001

Trust: 0.1

db:SEEBUGid:SSVID-75002

Trust: 0.1

db:VULHUBid:VHN-4325

Trust: 0.1

sources: VULHUB: VHN-4325 // BID: 3609 // CNNVD: CNNVD-200112-201 // NVD: CVE-2001-1524

REFERENCES

url:http://www.securityfocus.com/bid/3609

Trust: 2.7

url:http://prdownloads.sourceforge.net/phpnuke/php-nuke-5.5.tar.gz

Trust: 2.7

url:http://www.iss.net/security_center/static/7654.php

Trust: 2.7

url:http://online.securityfocus.com/archive/82/243545

Trust: 2.1

url:http://online.securityfocus.com/archive/1/245691

Trust: 2.1

url:http://online.securityfocus.com/archive/1/245875

Trust: 2.1

url:http://online.securityfocus.com/archive/82/246603

Trust: 2.1

url:http://www.securityfocus.com/archive/82/246603

Trust: 0.3

url:http://www.irannuke.com/

Trust: 0.3

url:/archive/1/362266

Trust: 0.3

sources: VULHUB: VHN-4325 // BID: 3609 // CNNVD: CNNVD-200112-201 // NVD: CVE-2001-1524

CREDITS

This vulnerability was submitted to BugTraq on December 3rd, 2001 by Cabezon Aurlien <aurelien.cabezon@isecurelabs.com>.

Trust: 0.6

sources: CNNVD: CNNVD-200112-201

SOURCES

db:VULHUBid:VHN-4325
db:BIDid:3609
db:CNNVDid:CNNVD-200112-201
db:NVDid:CVE-2001-1524

LAST UPDATE DATE

2024-11-22T22:48:52.575000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-4325date:2008-09-10T00:00:00
db:BIDid:3609date:2001-12-03T00:00:00
db:CNNVDid:CNNVD-200112-201date:2005-10-20T00:00:00
db:NVDid:CVE-2001-1524date:2024-11-20T23:37:53.530

SOURCES RELEASE DATE

db:VULHUBid:VHN-4325date:2001-12-31T00:00:00
db:BIDid:3609date:2001-12-03T00:00:00
db:CNNVDid:CNNVD-200112-201date:2001-12-31T00:00:00
db:NVDid:CVE-2001-1524date:2001-12-31T05:00:00