CVE-2005-4260 (GCVE-0-2005-4260)
Vulnerability from cvelistv5 – Published: 2005-12-15 11:00 – Updated: 2024-08-07 23:38
VLAI?
Summary
Interpretation conflict in includes/mainfile.php in PHP-Nuke 7.9 and later allows remote attackers to perform cross-site scripting (XSS) attacks by replacing the ">" in the tag with a "<", which bypasses the regular expressions that sanitize the data, but is automatically corrected by many web browsers. NOTE: it could be argued that this vulnerability is due to a design limitation of many web browsers; if so, then this should not be treated as a vulnerability in PHP-Nuke.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T23:38:51.522Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20051214 Bypass XSS filter in PHPNUKE 7.9=\u003ex",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/419496/100/0/threaded"
},
{
"name": "20051220 Re: XSS bypass in PHPNuke - FIX ?",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/419991/100/0/threaded"
},
{
"name": "15855",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/15855"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2005-12-14T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Interpretation conflict in includes/mainfile.php in PHP-Nuke 7.9 and later allows remote attackers to perform cross-site scripting (XSS) attacks by replacing the \"\u003e\" in the tag with a \"\u003c\", which bypasses the regular expressions that sanitize the data, but is automatically corrected by many web browsers. NOTE: it could be argued that this vulnerability is due to a design limitation of many web browsers; if so, then this should not be treated as a vulnerability in PHP-Nuke."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-19T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20051214 Bypass XSS filter in PHPNUKE 7.9=\u003ex",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/419496/100/0/threaded"
},
{
"name": "20051220 Re: XSS bypass in PHPNuke - FIX ?",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/419991/100/0/threaded"
},
{
"name": "15855",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/15855"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2005-4260",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Interpretation conflict in includes/mainfile.php in PHP-Nuke 7.9 and later allows remote attackers to perform cross-site scripting (XSS) attacks by replacing the \"\u003e\" in the tag with a \"\u003c\", which bypasses the regular expressions that sanitize the data, but is automatically corrected by many web browsers. NOTE: it could be argued that this vulnerability is due to a design limitation of many web browsers; if so, then this should not be treated as a vulnerability in PHP-Nuke."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20051214 Bypass XSS filter in PHPNUKE 7.9=\u003ex",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/419496/100/0/threaded"
},
{
"name": "20051220 Re: XSS bypass in PHPNuke - FIX ?",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/419991/100/0/threaded"
},
{
"name": "15855",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/15855"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2005-4260",
"datePublished": "2005-12-15T11:00:00",
"dateReserved": "2005-12-15T00:00:00",
"dateUpdated": "2024-08-07T23:38:51.522Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:francisco_burzi:php-nuke:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8EE03D77-9AA8-4DC6-936D-0459BD26B64B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:francisco_burzi:php-nuke:7.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA80B501-6EC3-4C8E-A83D-F08FC659CF82\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:francisco_burzi:php-nuke:7.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"87591D05-AC0B-4047-AE5B-69EBEF63ED5B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:francisco_burzi:php-nuke:7.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CBB90508-B7AE-4018-B88C-7A09F1EEFAB5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:francisco_burzi:php-nuke:7.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9605907F-B252-4A80-8494-F2970E618902\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:francisco_burzi:php-nuke:7.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"50D1BC17-2A99-495A-B462-D02B66F00D92\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:francisco_burzi:php-nuke:7.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9F9A4F5F-31CB-4097-85E9-B08B2530E9EE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:francisco_burzi:php-nuke:7.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5820C37B-1503-4494-8123-ECAF28386231\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Interpretation conflict in includes/mainfile.php in PHP-Nuke 7.9 and later allows remote attackers to perform cross-site scripting (XSS) attacks by replacing the \\\"\u003e\\\" in the tag with a \\\"\u003c\\\", which bypasses the regular expressions that sanitize the data, but is automatically corrected by many web browsers. NOTE: it could be argued that this vulnerability is due to a design limitation of many web browsers; if so, then this should not be treated as a vulnerability in PHP-Nuke.\"}, {\"lang\": \"es\", \"value\": \"Conflicto de interpretaci\\u00f3n en includes/mainfile.php en PHP-Nuke 7.9 y anteriores permite a atacantes remotos realizar ataques de secuencias de comandos en sitios cruzados (XSS) reemplazando el \\\"\u003e\\\" en una etiqueta con un \\\"\u003c\\\" lo que evita las expresiones regulares que sanean los datos, pero es autom\\u00e1ticamente corregido por muchos navegadores web.\\r\\nNOTA: podr\\u00eda ser argumentado que esto es debido a una limitaci\\u00f3n de dise\\u00f1o de muchos navegadores web; si es as\\u00ed, esto no deber\\u00eda ser tratado como una vulnerabilidad de PHP-Nuke.\"}]",
"id": "CVE-2005-4260",
"lastModified": "2024-11-21T00:03:49.190",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:N/I:P/A:N\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2005-12-15T11:03:00.000",
"references": "[{\"url\": \"http://www.securityfocus.com/archive/1/419496/100/0/threaded\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/archive/1/419991/100/0/threaded\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/15855\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/419496/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/419991/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/15855\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\"]}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2005-4260\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2005-12-15T11:03:00.000\",\"lastModified\":\"2025-04-03T01:03:51.193\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Interpretation conflict in includes/mainfile.php in PHP-Nuke 7.9 and later allows remote attackers to perform cross-site scripting (XSS) attacks by replacing the \\\"\u003e\\\" in the tag with a \\\"\u003c\\\", which bypasses the regular expressions that sanitize the data, but is automatically corrected by many web browsers. NOTE: it could be argued that this vulnerability is due to a design limitation of many web browsers; if so, then this should not be treated as a vulnerability in PHP-Nuke.\"},{\"lang\":\"es\",\"value\":\"Conflicto de interpretaci\u00f3n en includes/mainfile.php en PHP-Nuke 7.9 y anteriores permite a atacantes remotos realizar ataques de secuencias de comandos en sitios cruzados (XSS) reemplazando el \\\"\u003e\\\" en una etiqueta con un \\\"\u003c\\\" lo que evita las expresiones regulares que sanean los datos, pero es autom\u00e1ticamente corregido por muchos navegadores web.\\r\\nNOTA: podr\u00eda ser argumentado que esto es debido a una limitaci\u00f3n de dise\u00f1o de muchos navegadores web; si es as\u00ed, esto no deber\u00eda ser tratado como una vulnerabilidad de PHP-Nuke.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:francisco_burzi:php-nuke:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EE03D77-9AA8-4DC6-936D-0459BD26B64B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:francisco_burzi:php-nuke:7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA80B501-6EC3-4C8E-A83D-F08FC659CF82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:francisco_burzi:php-nuke:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87591D05-AC0B-4047-AE5B-69EBEF63ED5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:francisco_burzi:php-nuke:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBB90508-B7AE-4018-B88C-7A09F1EEFAB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:francisco_burzi:php-nuke:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9605907F-B252-4A80-8494-F2970E618902\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:francisco_burzi:php-nuke:7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50D1BC17-2A99-495A-B462-D02B66F00D92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:francisco_burzi:php-nuke:7.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F9A4F5F-31CB-4097-85E9-B08B2530E9EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:francisco_burzi:php-nuke:7.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5820C37B-1503-4494-8123-ECAF28386231\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/archive/1/419496/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/419991/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/15855\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.securityfocus.com/archive/1/419496/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/419991/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/15855\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…