Show plain JSON{"id": "CVE-2013-1804", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "published": "2014-04-29T20:55:08.747", "references": [{"url": "http://osvdb.org/90707", "source": "secalert@redhat.com"}, {"url": "http://osvdb.org/90708", "source": "secalert@redhat.com"}, {"url": "http://packetstormsecurity.com/files/120598/PHP-Fusion-7.02.05-XSS-LFI-SQL-Injection.html", "source": "secalert@redhat.com"}, {"url": "http://seclists.org/fulldisclosure/2013/Feb/154", "source": "secalert@redhat.com"}, {"url": "http://secunia.com/advisories/52403", "tags": ["Vendor Advisory"], "source": "secalert@redhat.com"}, {"url": "http://www.openwall.com/lists/oss-security/2013/03/03/1", "source": "secalert@redhat.com"}, {"url": "http://www.openwall.com/lists/oss-security/2013/03/03/2", "source": "secalert@redhat.com"}, {"url": "http://www.php-fusion.co.uk/news.php?readmore=569", "tags": ["Vendor Advisory"], "source": "secalert@redhat.com"}, {"url": "http://www.waraxe.us/advisory-97.html", "source": "secalert@redhat.com"}, {"url": "http://osvdb.org/90707", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://osvdb.org/90708", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://packetstormsecurity.com/files/120598/PHP-Fusion-7.02.05-XSS-LFI-SQL-Injection.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://seclists.org/fulldisclosure/2013/Feb/154", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/52403", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2013/03/03/1", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2013/03/03/2", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.php-fusion.co.uk/news.php?readmore=569", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.waraxe.us/advisory-97.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-79"}]}], "descriptions": [{"lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in PHP-Fusion before 7.02.06 allow remote attackers to inject arbitrary web script or HTML via the (1) highlight parameter to forum/viewthread.php; or remote authenticated users with certain permissions to inject arbitrary web script or HTML via the (2) user_list or (3) user_types parameter to messages.php; (4) message parameter to infusions/shoutbox_panel/shoutbox_admin.php; (5) message parameter to administration/news.php; (6) panel_list parameter to administration/panel_editor.php; (7) HTTP User Agent string to administration/phpinfo.php; (8) \"__BBCODE__\" parameter to administration/bbcodes.php; errorMessage parameter to (9) article_cats.php, (10) download_cats.php, (11) news_cats.php, or (12) weblink_cats.php in administration/, when error is 3; or (13) body or (14) body2 parameter to administration/articles.php."}, {"lang": "es", "value": "M\u00faltiples vulnerabilidades de XSS en PHP-Fusion anterior a 7.02.06 permiten a atacantes remotos inyectar script Web o HTML arbitrarios a trav\u00e9s del (1) par\u00e1metro highlight hacia forum/viewthread.php; o usuarios remotos autenticados con ciertos permisos inyectar script Web o HTML arbitrarios a trav\u00e9s del (2) par\u00e1metro user_list o (3) el par\u00e1metro user_types hacia messages.php; (4) el par\u00e1metro message hacia infusions/shoutbox_panel/shoutbox_admin.php; (5) el par\u00e1metro message hacia administration/news.php; (6) el par\u00e1metro panel_list hacia administration/panel_editor.php; (7) la cadena HTTP User Agent hacia administration/phpinfo.php; (8) el par\u00e1metro \"__BBCODE__\" hacia administration/bbcodes.php; el par\u00e1metro errorMessage hacia (9) article_cats.php, (10) download_cats.php, (11) news_cats.php o (12) weblink_cats.php en administration/, cuando el error es 3; o (13) el par\u00e1metro body o (14) body2 hacia administration/articles.php."}], "lastModified": "2025-04-12T10:46:40.837", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:php-fusion:php-fusion:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2B9F0261-3C99-444D-9F7B-766101BC9F61", "versionEndIncluding": "7.02.05"}, {"criteria": "cpe:2.3:a:php-fusion:php-fusion:7.02.01:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0DA2B830-5DC6-42E8-882F-58AEAA9A5C5F"}, {"criteria": "cpe:2.3:a:php-fusion:php-fusion:7.02.02:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9CC2526A-05C0-44B0-BB28-8B0A3A71157C"}, {"criteria": "cpe:2.3:a:php-fusion:php-fusion:7.02.03:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5F807AC1-7103-481C-B2CE-85C6B82C0941"}, {"criteria": "cpe:2.3:a:php-fusion:php-fusion:7.02.04:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "92911880-2EDA-4A67-B8AE-FF2CB7DCA9BE"}], "operator": "OR"}]}], "sourceIdentifier": "secalert@redhat.com"}