CVE-2006-7050 (GCVE-0-2006-7050)
Vulnerability from cvelistv5 – Published: 2007-02-24 00:00 – Updated: 2024-08-07 20:50
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in WikkaWiki (Wikka Wiki) before 1.1.6.2 allows remote attackers to inject arbitrary javascript via (1) events in forced links (url parameter) that are not properly handled in formatters/wakka.php, and possibly (2) other vectors in wikka.php.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T20:50:06.182Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://wikkawiki.org/WikkaReleaseNotes"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://wush.net/trac/wikka/changeset/47"
},
{
"name": "ADV-2006-2381",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/2381"
},
{
"name": "20628",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/20628"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://wush.net/trac/wikka/ticket/142"
},
{
"name": "wikkawiki-url-xss(27227)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27227"
},
{
"name": "18481",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/18481"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-06-12T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in WikkaWiki (Wikka Wiki) before 1.1.6.2 allows remote attackers to inject arbitrary javascript via (1) events in forced links (url parameter) that are not properly handled in formatters/wakka.php, and possibly (2) other vectors in wikka.php."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://wikkawiki.org/WikkaReleaseNotes"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://wush.net/trac/wikka/changeset/47"
},
{
"name": "ADV-2006-2381",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/2381"
},
{
"name": "20628",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/20628"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://wush.net/trac/wikka/ticket/142"
},
{
"name": "wikkawiki-url-xss(27227)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27227"
},
{
"name": "18481",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/18481"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-7050",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in WikkaWiki (Wikka Wiki) before 1.1.6.2 allows remote attackers to inject arbitrary javascript via (1) events in forced links (url parameter) that are not properly handled in formatters/wakka.php, and possibly (2) other vectors in wikka.php."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://wikkawiki.org/WikkaReleaseNotes",
"refsource": "CONFIRM",
"url": "http://wikkawiki.org/WikkaReleaseNotes"
},
{
"name": "http://wush.net/trac/wikka/changeset/47",
"refsource": "CONFIRM",
"url": "http://wush.net/trac/wikka/changeset/47"
},
{
"name": "ADV-2006-2381",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2381"
},
{
"name": "20628",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20628"
},
{
"name": "http://wush.net/trac/wikka/ticket/142",
"refsource": "CONFIRM",
"url": "http://wush.net/trac/wikka/ticket/142"
},
{
"name": "wikkawiki-url-xss(27227)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27227"
},
{
"name": "18481",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18481"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-7050",
"datePublished": "2007-02-24T00:00:00",
"dateReserved": "2007-02-23T00:00:00",
"dateUpdated": "2024-08-07T20:50:06.182Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wikkawiki:wikkawiki:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.1.6.1\", \"matchCriteriaId\": \"98ABA654-0C36-4611-87A0-4DC94592BB17\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Cross-site scripting (XSS) vulnerability in WikkaWiki (Wikka Wiki) before 1.1.6.2 allows remote attackers to inject arbitrary javascript via (1) events in forced links (url parameter) that are not properly handled in formatters/wakka.php, and possibly (2) other vectors in wikka.php.\"}, {\"lang\": \"es\", \"value\": \"Vulnerabilida de secuencia de comandos en sitios cruzados (XSS) en WikkaWiki (Wikka Wiki) anterior a 1.1.6.2 permite a atacantes remotos inyectar javascript de su elecci\\u00f3n a trav\\u00e9s de (1) eventos en enlaces forzados (par\\u00e1metro url) que no son manejadas adecuadamente en formatters/wakka.php, y posiblemente (2) otros vectores en wikka.php.\"}]",
"id": "CVE-2006-7050",
"lastModified": "2024-11-21T00:24:16.073",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:P/A:P\", \"baseScore\": 6.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": true, \"userInteractionRequired\": false}]}",
"published": "2007-02-24T00:28:00.000",
"references": "[{\"url\": \"http://secunia.com/advisories/20628\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"http://wikkawiki.org/WikkaReleaseNotes\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://wush.net/trac/wikka/changeset/47\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://wush.net/trac/wikka/ticket/142\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/18481\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.vupen.com/english/advisories/2006/2381\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/27227\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/20628\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://wikkawiki.org/WikkaReleaseNotes\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://wush.net/trac/wikka/changeset/47\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://wush.net/trac/wikka/ticket/142\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/18481\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2006/2381\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/27227\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2006-7050\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2007-02-24T00:28:00.000\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Cross-site scripting (XSS) vulnerability in WikkaWiki (Wikka Wiki) before 1.1.6.2 allows remote attackers to inject arbitrary javascript via (1) events in forced links (url parameter) that are not properly handled in formatters/wakka.php, and possibly (2) other vectors in wikka.php.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilida de secuencia de comandos en sitios cruzados (XSS) en WikkaWiki (Wikka Wiki) anterior a 1.1.6.2 permite a atacantes remotos inyectar javascript de su elecci\u00f3n a trav\u00e9s de (1) eventos en enlaces forzados (par\u00e1metro url) que no son manejadas adecuadamente en formatters/wakka.php, y posiblemente (2) otros vectores en wikka.php.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":true,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wikkawiki:wikkawiki:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.1.6.1\",\"matchCriteriaId\":\"98ABA654-0C36-4611-87A0-4DC94592BB17\"}]}]}],\"references\":[{\"url\":\"http://secunia.com/advisories/20628\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://wikkawiki.org/WikkaReleaseNotes\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://wush.net/trac/wikka/changeset/47\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://wush.net/trac/wikka/ticket/142\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/18481\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/2381\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/27227\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/20628\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://wikkawiki.org/WikkaReleaseNotes\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://wush.net/trac/wikka/changeset/47\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://wush.net/trac/wikka/ticket/142\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/18481\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/2381\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/27227\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…