How to Buy
This script is Copyright (C) 2005-2015 Tenable Network Security, Inc.
The remote web server contains several PHP scripts that are prone to
multiple flaws, including possible arbitrary PHP code execution.
According to its version number, the remote host is running a version
of CuteNews that allows an attacker to inject arbitrary script through
the variables 'X-FORWARDED-FOR' or 'CLIENT-IP' when adding a comment.
On one hand, an attacker can inject a client-side script to be
executed by an administrator's browser when he/she chooses to edit the
added comment. On the other, an attacker with local access could
leverage this flaw to run arbitrary PHP code in the context of the web
Additionally, it suffers from a cross-site scripting flaw involving
the 'search.php' script.
See also :
Unknown at this time.
Risk factor :
Low / CVSS Base Score : 1.9
CVSS Temporal Score : 1.9
Public Exploit Available : true
Family: CGI abuses : XSS
Nessus Plugin ID: 17256 (cutenews_ip_script_injection.nasl)
Bugtraq ID: 1269114328
CVE ID: CVE-2005-0645CVE-2005-2393
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.