ID

VAR-200604-0373


CVE

CVE-2006-1846


TITLE

PHP-Nuke Your_Account Module Cross-site scripting vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-200604-291

DESCRIPTION

Cross-site scripting (XSS) vulnerability in the Your_Account module in PHP-Nuke 7.8 might allows remote attackers to inject arbitrary HTML and web script via the ublock parameter, which is saved in the user's personal menu. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. In addition, it is unclear whether this issue is a vulnerability, since it is related to the user's personal menu, which presumably is not modifiable by others. PHPNuke is prone to multiple input-validation vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input. The application is prone to HTML- and SQL-injection vulnerabilities. PHPNuke 7.8 is reported to be vulnerable. Other versions may also be affected. The Your_Account module in PHP-Nuke 7.8 has a cross-site scripting vulnerability. TITLE: PHP-Nuke Personal Menu Script Insertion and SQL Injection SECUNIA ADVISORY ID: SA18972 VERIFY ADVISORY: http://secunia.com/advisories/18972/ CRITICAL: Moderately critical IMPACT: Cross Site Scripting, Manipulation of data WHERE: >From remote SOFTWARE: PHP-Nuke 7.x http://secunia.com/product/2385/ DESCRIPTION: Jason Lau has discovered two vulnerabilities in PHP-Nuke, which can be exploited by malicious people to conduct SQL injection and script insertion attacks. Example: <img src=javascript:[code]> (requires the Microsoft Internet Explorer browser) 2) Input passed to the "user_id" parameter in the "Your_Home" functionality of the "Your_Account" module isn't properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Successful exploitation requires that "magic_quotes_gpc" is disabled. The vulnerabilities have been confirmed in version 7.8. SOLUTION: Edit the source code to ensure that input is properly sanitised. PROVIDED AND/OR DISCOVERED BY: Jason Lau ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 1.35

sources: NVD: CVE-2006-1846 // BID: 16774 // VULHUB: VHN-17954 // PACKETSTORM: 44052

AFFECTED PRODUCTS

vendor:francisco burzimodel:php-nukescope:eqversion:7.8

Trust: 1.6

vendor:franciscomodel:burzi php-nukescope:eqversion:7.8

Trust: 0.3

sources: BID: 16774 // CNNVD: CNNVD-200604-291 // NVD: CVE-2006-1846

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2006-1846
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-200604-291
value: MEDIUM

Trust: 0.6

VULHUB: VHN-17954
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2006-1846
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-17954
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-17954 // CNNVD: CNNVD-200604-291 // NVD: CVE-2006-1846

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2006-1846

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200604-291

TYPE

XSS

Trust: 0.6

sources: CNNVD: CNNVD-200604-291

EXTERNAL IDS

db:BIDid:16774

Trust: 2.0

db:SECUNIAid:18972

Trust: 1.8

db:NVDid:CVE-2006-1846

Trust: 1.7

db:OSVDBid:23431

Trust: 1.7

db:VUPENid:ADV-2006-0687

Trust: 1.7

db:CNNVDid:CNNVD-200604-291

Trust: 0.7

db:VULHUBid:VHN-17954

Trust: 0.1

db:PACKETSTORMid:44052

Trust: 0.1

sources: VULHUB: VHN-17954 // BID: 16774 // PACKETSTORM: 44052 // CNNVD: CNNVD-200604-291 // NVD: CVE-2006-1846

REFERENCES

url:http://www.securityfocus.com/bid/16774

Trust: 1.7

url:http://www.osvdb.org/23431

Trust: 1.7

url:http://secunia.com/advisories/18972

Trust: 1.7

url:http://www.vupen.com/english/advisories/2006/0687

Trust: 1.1

url:http://www.frsirt.com/english/advisories/2006/0687

Trust: 0.6

url:http://www.phpnuke.org

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/2385/

Trust: 0.1

url:http://secunia.com/advisories/18972/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-17954 // BID: 16774 // PACKETSTORM: 44052 // CNNVD: CNNVD-200604-291 // NVD: CVE-2006-1846

CREDITS

Discovered by Jason Lau.

Trust: 0.9

sources: BID: 16774 // CNNVD: CNNVD-200604-291

SOURCES

db:VULHUBid:VHN-17954
db:BIDid:16774
db:PACKETSTORMid:44052
db:CNNVDid:CNNVD-200604-291
db:NVDid:CVE-2006-1846

LAST UPDATE DATE

2024-08-14T13:39:45.815000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-17954date:2011-03-08T00:00:00
db:BIDid:16774date:2006-02-23T18:57:00
db:CNNVDid:CNNVD-200604-291date:2006-04-20T00:00:00
db:NVDid:CVE-2006-1846date:2011-03-08T02:34:24.487

SOURCES RELEASE DATE

db:VULHUBid:VHN-17954date:2006-04-19T00:00:00
db:BIDid:16774date:2005-11-08T00:00:00
db:PACKETSTORMid:44052date:2006-02-22T19:02:22
db:CNNVDid:CNNVD-200604-291date:2006-04-19T00:00:00
db:NVDid:CVE-2006-1846date:2006-04-19T16:06:00