Korean
<< Back
VID 21843
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The installed version of PostNuke software seems to be a version prior to 0.762. PostNuke, developed by Francisco Burzi, is a freely available, open source PHP-based content management system (CMS). PostNuke versions prior to 0.762 are vulnerable to multiple input validation vulnerabilities, which can be exploited by a remote attacker to conduct cross-site scripting and SQL injection attacks.

1) SQL injection vulnerability in the NS-Languages module for PostNuke, when magic_quotes_gpc is off, allows a remote attacker to execute arbitrary SQL commands via the language parameter.
2) Cross-site scripting (XSS) vulnerability: This vulnerability allows a remote attacker to inject arbitrary web script or HTML via the "htmltext" parameter in user.php and the "language" parameter in the NS-Languages module.

* References:
http://news.postnuke.com/index.php?name=News&file=article&sid=2754
http://securityreason.com/achievement_securityalert/33
http://securityreason.com/securityalert/454
http://lists.grok.org.uk/pipermail/full-disclosure/2006-February/042360.html
http://news.postnuke.com/index.php?name=News&file=article&sid=2754
http://archives.neohapsis.com/archives/fulldisclosure/2006-02/0469.html
http://www.frsirt.com/english/advisories/2006/0673
http://secunia.com/advisories/18937/

* Platforms Affected:
Francisco Burzi, PostNuke version 0.761 and earlier versions
Any operating system Any version
Recommendation Upgrade to the latest version of PostNuke (0.762 or later), available from the PostNuke Download Web page at http://sourceforge.net/projects/post-nuke/
Related URL CVE-2006-0801,CVE-2006-0802 (CVE)
Related URL 16752 (SecurityFocus)
Related URL 24823,24827 (ISS)