fkie_cve-2006-3253
Vulnerability from fkie_nvd
Published
2006-06-28 01:45
Modified
2025-04-03 01:03
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in member.php in vBulletin 3.5.x allows remote attackers to inject arbitrary web script or HTML via the u parameter. NOTE: the vendor has disputed this report, stating that they have been unable to replicate the issue and that "the userid parameter is run through our filtering system as an unsigned integer.
Impacted products
Vendor Product Version
jelsoft vbulletin 3.5.0
jelsoft vbulletin 3.5.0_beta_1
jelsoft vbulletin 3.5.0_beta_2
jelsoft vbulletin 3.5.0_beta_3
jelsoft vbulletin 3.5.0_beta_4
jelsoft vbulletin 3.5.0_rc1
jelsoft vbulletin 3.5.0_rc2
jelsoft vbulletin 3.5.0_rc3
jelsoft vbulletin 3.5.1
jelsoft vbulletin 3.5.2
jelsoft vbulletin 3.5.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:jelsoft:vbulletin:3.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4F1E282-4066-49AB-9596-8B2FFA68164C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jelsoft:vbulletin:3.5.0_beta_1:*:*:*:*:*:*:*",
              "matchCriteriaId": "87616537-EBD6-42FD-B7F7-E2977C8FD81F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jelsoft:vbulletin:3.5.0_beta_2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C80E010-C3B1-4513-BB70-CCDD1BE0A265",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jelsoft:vbulletin:3.5.0_beta_3:*:*:*:*:*:*:*",
              "matchCriteriaId": "14A138ED-6467-45BB-9E6E-31FEFCF582EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jelsoft:vbulletin:3.5.0_beta_4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7162E3FF-B888-4C3D-8A83-881F386E218B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jelsoft:vbulletin:3.5.0_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "41C90C0A-3083-47BC-BC3F-AD0A04089C82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jelsoft:vbulletin:3.5.0_rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C83E2186-9935-4103-886F-E90411A1885F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jelsoft:vbulletin:3.5.0_rc3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6226F609-7F9E-4FC3-986D-B984CDBA0898",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jelsoft:vbulletin:3.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A869E6C9-6CA7-4FB8-88E2-142C6294D028",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jelsoft:vbulletin:3.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "4070579C-00AD-4DB1-8B07-4CB88D4EDBEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jelsoft:vbulletin:3.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "86E53DA6-83A3-493A-8C98-DEA91F91D71E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [
    {
      "sourceIdentifier": "cve@mitre.org",
      "tags": [
        "disputed"
      ]
    }
  ],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in member.php in vBulletin 3.5.x allows remote attackers to inject arbitrary web script or HTML via the u parameter.  NOTE: the vendor has disputed this report, stating that they have been unable to replicate the issue and that \"the userid parameter is run through our filtering system as an unsigned integer."
    },
    {
      "lang": "es",
      "value": "** IMPUGNADA ** M\u00faltiples vulnerabilidades de ejecuci\u00f3n de secuencias de comandos en sitios cruzados en member.php en vBulletin v3.5.x permite a atacantes remotos inyectar c\u00f3digo web o HTML de su elecci\u00f3n a trav\u00e9s del par\u00e1metro u. NOTA: el vendedor impugna la importancia de este informe, manteniendo que les ha sido imposible reproducir la vulnerabilidad y que \"el par\u00e1metro userid es filtrado a trav\u00e9s de nuestro sistema como un entero sin signo.\""
    }
  ],
  "id": "CVE-2006-3253",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.6,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2006-06-28T01:45:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/1155"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://securitytracker.com/id?1016348"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/27508"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/437817/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/438364/100/100/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/18551"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27261"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/1155"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://securitytracker.com/id?1016348"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/27508"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/437817/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/438364/100/100/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/18551"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27261"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…