Interpretation conflict in PostNuke 0.761 and earlier allows remote attackers to conduct cross-site scripting (XSS) attacks via HTML tags with a trailing "<" character, which is interpreted as a ">" character by some web browsers but bypasses the blacklist protection in (1) the pnVarCleanFromInput function in pnAPI.php, (2) the pnSecureInput function in pnAntiCracker.php, and (3) the htmltext parameter in an edituser operation to user.php.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://www.vupen.com/english/advisories/2006/0673 | vdb entry vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/24823 | vdb entry |
http://www.securityfocus.com/bid/16752 | exploit vdb entry patch |
http://news.postnuke.com/index.php?name=News&file=article&sid=2754 | patch |
http://archives.neohapsis.com/archives/fulldisclosure/2006-02/0469.html | mailing list |
http://secunia.com/advisories/18937 | third party advisory patch vendor advisory |
http://securityreason.com/securityalert/454 | third party advisory |