CVE-2005-4621 (CNNVD-200512-660)
MEDIUM
中文标题:
VBulletin Profile.PHP跨站脚本攻击漏洞
英文标题:
Cross-site scripting (XSS) vulnerability in the editavatar page in vBulletin 3.5.1 allows remote att...
CVSS分数:
4.3
发布时间:
2006-01-06 11:00:00
漏洞类型:
跨站脚本
状态:
PUBLISHED
数据质量分数:
0.30
数据版本:
v3
漏洞描述
中文描述:
vBulletin 3.5.1 中的editavatar页存在跨站脚本攻击漏洞,远程攻击者可以通过一个在远程avatar url 字段中的URL注入任意Web脚本或URL,其中URL会生成一个解析错误,并可能要求一个如.jpg的结尾扩展。
英文描述:
Cross-site scripting (XSS) vulnerability in the editavatar page in vBulletin 3.5.1 allows remote attackers to inject arbitrary web script or HTML via a URL in the remote avatar url field, in which the URL generates a parsing error, and possibly requiring a trailing extension such as .jpg.
CWE类型:
(暂无数据)
标签:
(暂无数据)
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| jelsoft | vbulletin | 1.0.1 | - | - |
cpe:2.3:a:jelsoft:vbulletin:1.0.1:*:lite:*:*:*:*:*
|
| jelsoft | vbulletin | 2.0.3 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.0.3:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.0_rc2 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.0_rc2:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.0_rc3 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.0_rc3:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.2.0 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.2.0:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.2.1 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.2.1:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.2.2 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.2.2:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.2.3 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.2.3:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.2.4 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.2.4:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.2.5 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.2.5:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.2.6 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.2.6:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.2.7 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.2.7:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.2.8 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.2.8:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.2.9 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.2.9:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.3.0 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.3.0:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.3.2 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.3.2:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.3.3 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.3.3:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.3.4 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.3.4:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.3.8 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.3.8:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0.1 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0.1:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0.2 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0.2:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0.3 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0.3:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0.4 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0.4:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0.5 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0.5:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0.6 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0.6:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0.7 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0.7:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0.8 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0.8:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0.9 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0.9:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0.10 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0.10:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0_beta_2 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0_beta_2:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0_beta_3 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0_beta_3:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0_beta_4 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0_beta_4:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0_beta_5 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0_beta_5:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0_beta_6 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0_beta_6:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0_beta_7 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0_beta_7:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0_gamma | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0_gamma:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.5.1 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.5.1:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
CVSS评分详情
4.3
MEDIUM
CVSS向量:
AV:N/AC:M/Au:N/C:N/I:P/A:N
CVSS版本:
2.0
机密性
NONE
完整性
PARTIAL
可用性
NONE
时间信息
发布时间:
2006-01-06 11:00:00
修改时间:
2024-08-07 23:53:28
创建时间:
2025-11-11 15:32:30
更新时间:
2025-11-11 15:49:03
利用信息
暂无可利用代码信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2005-4621 |
2025-11-11 15:17:38 | 2025-11-11 07:32:30 |
| NVD | nvd_CVE-2005-4621 |
2025-11-11 14:51:21 | 2025-11-11 07:41:16 |
| CNNVD | cnnvd_CNNVD-200512-660 |
2025-11-11 15:08:49 | 2025-11-11 07:49:03 |
版本与语言
当前版本:
v3
主要语言:
EN
支持语言:
EN
ZH
安全公告
暂无安全公告信息
变更历史
v3
CNNVD
2025-11-11 15:49:03
vulnerability_type: 未提取 → 跨站脚本; cnnvd_id: 未提取 → CNNVD-200512-660; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 跨站脚本
- cnnvd_id: 未提取 -> CNNVD-200512-660
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2
NVD
2025-11-11 15:41:16
cvss_score: 未提取 → 4.3; cvss_vector: NOT_EXTRACTED → AV:N/AC:M/Au:N/C:N/I:P/A:N; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 38; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
- cvss_score: 未提取 -> 4.3
- cvss_vector: NOT_EXTRACTED -> AV:N/AC:M/Au:N/C:N/I:P/A:N
- cvss_version: NOT_EXTRACTED -> 2.0
- affected_products_count: 0 -> 38
- data_sources: ['cve'] -> ['cve', 'nvd']