CVE-2005-3023 (CNNVD-200509-210)
中文标题:
vBulletin 多个跨站脚本攻击(XSS)漏洞
英文标题:
Multiple cross-site scripting (XSS) vulnerabilities in vBulletin 3.0.9 and earlier allow remote atta...
漏洞描述
中文描述:
Vbulletion是一个功能强大、可扩展和可完全定制的 Web 站点论坛,由PHP 编写,是大中站点社区建构理想的解决方案。 vBulletin 3.0.9 版及以前版本中存在多个跨站脚本攻击(XSS)漏洞,远程攻击者可以通过以下脚本中的特定变量注入任意web脚本或HTML:(1) announcement.php, (2) admincalendar.php, (3) bbcode.php, (4) cronadmin.php, (5) email.php, (6) faq.php, (7) forum.php, (8) image.php, (9) language.php, (10) ranks.php, (11) replacement.php, (12) replacement.php, (13) template.php, (14) template.php, (15) usergroup.php, 或 (16) usertitle.php。
英文描述:
Multiple cross-site scripting (XSS) vulnerabilities in vBulletin 3.0.9 and earlier allow remote attackers to inject arbitrary web script or HTML via certain arguments to (1) announcement.php, (2) admincalendar.php, (3) bbcode.php, (4) cronadmin.php, (5) email.php, (6) faq.php, (7) forum.php, (8) image.php, (9) language.php, (10) ranks.php, (11) replacement.php, (12) replacement.php, (13) template.php, (14) template.php, (15) usergroup.php, or (16) usertitle.php.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| jelsoft | vbulletin | 1.0.1 | - | - |
cpe:2.3:a:jelsoft:vbulletin:1.0.1:*:lite:*:*:*:*:*
|
| jelsoft | vbulletin | 2.0.3 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.0.3:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.0_rc2 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.0_rc2:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.0_rc3 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.0_rc3:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.2.0 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.2.0:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.2.1 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.2.1:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.2.2 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.2.2:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.2.3 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.2.3:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.2.4 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.2.4:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.2.5 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.2.5:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.2.6 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.2.6:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.2.7 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.2.7:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.2.8 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.2.8:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.2.9 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.2.9:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.3.0 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.3.0:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.3.2 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.3.2:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.3.3 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.3.3:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.3.4 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.3.4:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0.1 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0.1:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0.2 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0.2:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0.3 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0.3:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0.4 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0.4:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0.5 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0.5:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0.6 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0.6:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0.7 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0.7:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0.8 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0.8:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0.9 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0.9:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0_beta_2 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0_beta_2:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0_beta_3 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0_beta_3:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0_beta_4 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0_beta_4:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0_beta_5 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0_beta_5:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0_beta_6 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0_beta_6:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0_beta_7 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0_beta_7:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0_gamma | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0_gamma:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
CVSS评分详情
AV:N/AC:M/Au:N/C:N/I:P/A:N
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2005-3023 |
2025-11-11 15:17:36 | 2025-11-11 07:32:28 |
| NVD | nvd_CVE-2005-3023 |
2025-11-11 14:51:20 | 2025-11-11 07:41:14 |
| CNNVD | cnnvd_CNNVD-200509-210 |
2025-11-11 15:08:48 | 2025-11-11 07:49:00 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 跨站脚本
- cnnvd_id: 未提取 -> CNNVD-200509-210
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- cvss_score: 未提取 -> 4.3
- cvss_vector: NOT_EXTRACTED -> AV:N/AC:M/Au:N/C:N/I:P/A:N
- cvss_version: NOT_EXTRACTED -> 2.0
- affected_products_count: 0 -> 35
- data_sources: ['cve'] -> ['cve', 'nvd']