| Vulnerability Name: | CVE-2006-1796 (CCN-26181) | ||||||||
| Assigned: | 2005-09-18 | ||||||||
| Published: | 2005-09-18 | ||||||||
| Updated: | 2008-09-05 | ||||||||
| Summary: | Cross-site scripting (XSS) vulnerability in the paging links functionality in template-functions-links.php in Wordpress 1.5.2, and possibly other versions before 2.0.1, allows remote attackers to inject arbitrary web script or HTML to Internet Explorer users via the request URI ($_SERVER['REQUEST_URI']). The vulnerability manifests itself only when viewed by IE. This vulnerability is addressed in the following product release: Wordpress 2.0.1-1 | ||||||||
| CVSS v3 Severity: | 5.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
| CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||
| Vulnerability Type: | CWE-Other | ||||||||
| Vulnerability Consequences: | Gain Access | ||||||||
| References: | Source: CCN Type: Debian Bug report logs - #328909 wordpress: CSS Security Vulnerability Source: CONFIRM Type: Patch http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=328909 Source: MITRE Type: CNA CVE-2006-1796 Source: CCN Type: WordPress trac Ticket #1686 CSS Security Vulnerability Source: MISC Type: Patch http://trac.wordpress.org/ticket/1686 Source: CCN Type: WordPress Web site WordPress Source: CCN Type: OSVDB ID: 30927 Wordpress template-functions-links.php REQUEST_URI Parameter XSS Source: XF Type: UNKNOWN wordpress-templatefunctionslinks-xss(26181) | ||||||||
| Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
| BACK | |||||||||