CVE-2006-0361

Current Description

Cross-site scripting (XSS) vulnerability in addcomment.php in Bit 5 Blog 8.01 allows remote attackers to inject arbitrary web script or HTML via a javascript URI in an tag in the comment parameter, which strips most tags but not .

Basic Data

PublishedJanuary 22, 2006
Last ModifiedOctober 19, 2018
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:M/Au:N/C:N/I:P/A:N
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityMEDIUM
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactNONE
CVSS 2 - Availability ImpactNONE
CVSS 2 - Base Score4.3
SeverityMEDIUM
Exploitability Score8.6
Impact Score2.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationBit 5 BlogBit 5 Blog8.01*******

Vulnerable Software List

VendorProductVersions
Bit 5 Blog Bit 5 Blog 8.01

References

NameSourceURLTags
http://evuln.com/vulns/32/exploithttp://evuln.com/vulns/32/exploitMISCExploit
http://evuln.com/vulns/32/summary/http://evuln.com/vulns/32/summary/MISCExploit Vendor Advisory
18464http://secunia.com/advisories/18464SECUNIAExploit Vendor Advisory
22446http://www.osvdb.org/22446OSVDB
20060115 [eVuln] Bit 5 Blog JavaScript Insertion Vulnerabilityhttp://www.securityfocus.com/archive/1/421994/100/0/threadedBUGTRAQ
16246http://www.securityfocus.com/bid/16246BIDExploit
ADV-2006-0195http://www.vupen.com/english/advisories/2006/0195VUPEN
bit5blog-addcomment-xss(24129)https://exchange.xforce.ibmcloud.com/vulnerabilities/24129XF