Vulnerability Details : CVE-2006-4712
Potential exploit
Multiple cross-site scripting (XSS) vulnerabilities in Sage 1.3.6 allow remote attackers to inject arbitrary web script or HTML via JavaScript in a content:encoded element within an item element in an RSS feed, as demonstrated by four example content:encoded elements that use XMLHttpRequest to read arbitrary local files, aka "Cross Context Scripting."
Vulnerability category: Cross site scripting (XSS)
Products affected by CVE-2006-4712
- cpe:2.3:a:sage:sage:1.3.6:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-4712
2.12%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 83 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-4712
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2006-4712
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by: nvd@nist.gov (Primary)
References for CVE-2006-4712
-
http://www.gnucitizen.org/blog/cross-context-scripting-with-sage
-
http://www.snellspace.com/wp/?p=448
-
http://www.intertwingly.net/blog/2006/08/09/Attack-Delivery-TestSuite
-
http://securityreason.com/securityalert/1558
-
http://secunia.com/advisories/21839
Vendor Advisory
-
http://www.vupen.com/english/advisories/2006/3553
Vendor Advisory
-
http://www.securityfocus.com/archive/1/445648/100/0/threaded
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/28855
-
http://www.securityfocus.com/bid/19928
Exploit
-
http://www.snellspace.com/wp/?p=410
-
http://downloads.securityfocus.com/vulnerabilities/exploits/sage-inputvalidation.xml
Exploit
Jump to