Vulnerability Details : CVE-2007-1926
Potential exploit
Cross-site scripting (XSS) vulnerability in JBMC Software DirectAdmin before 1.293 does not properly display log files, which allows remote authenticated users to inject arbitrary web script or HTML via (1) http or (2) ftp requests logged in /var/log/directadmin/security.log; (3) allows context-dependent attackers to inject arbitrary web script or HTML into /var/log/messages via a PHP script that invokes /usr/bin/logger; (4) allows local users to inject arbitrary web script or HTML into /var/log/messages by invoking /usr/bin/logger at the command line; and allows remote attackers to inject arbitrary web script or HTML via remote requests logged in the (5) /var/log/exim/rejectlog, (6) /var/log/exim/mainlog, (7) /var/log/proftpd/auth.log, (8) /var/log/httpd/error_log, (9) /var/log/httpd/access_log, (10) /var/log/directadmin/error.log, and (11) /var/log/directadmin/security.log files.
Vulnerability category: Cross site scripting (XSS)
Products affected by CVE-2007-1926
- cpe:2.3:a:jbmc_software:directadmin:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2007-1926
0.76%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 71 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2007-1926
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
References for CVE-2007-1926
-
http://securityreason.com/securityalert/2534
-
http://www.directadmin.com/versions.php
Patch
-
http://www.securityfocus.com/bid/23254
-
http://secunia.com/advisories/24728
Exploit;Patch;Vendor Advisory
-
http://www.securityfocus.com/archive/1/464471/100/100/threaded
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/33390
-
http://www.directadmin.com/features.php?id=760
Jump to