CVE-2006-1590
Published Apr 3, 2006
Last updated 7 years ago
Overview
- Description
- Cross-site scripting (XSS) vulnerability in the PrintFreshPage function in (1) Basic Analysis and Security Engine (BASE) 1.2.4 and (2) Analysis Console for Intrusion Databases (ACID) 0.9.6b23 allows remote attackers to inject arbitrary web script or HTML via the (a) back parameter to base_graph_main.php, (b) netmask parameter to base_stat_ipaddr.php, or (c) submit parameter to base_qry_alert.php within BASE, or (d) query string to acid_main.php in ACID, which causes the request URI ($_SERVER['REQUEST_URI']) to be inserted into a refresh operation.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Evaluator
- Comment
- -
- Impact
- -
- Solution
- -
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:kevin_johnson:basic_analysis_and_security_engine:0.9.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D0D78AC4-55B1-46FE-9875-112A27E740E7" }, { "criteria": "cpe:2.3:a:kevin_johnson:basic_analysis_and_security_engine:0.9.7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "67C43D3C-AFB0-4265-AE28-5965AD62B1AA" }, { "criteria": "cpe:2.3:a:kevin_johnson:basic_analysis_and_security_engine:0.9.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "74D08241-B90D-420A-B763-654B99ACEE2A" }, { "criteria": "cpe:2.3:a:kevin_johnson:basic_analysis_and_security_engine:0.9.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "28FA0D32-A1BC-47D6-89ED-A559585F2F98" }, { "criteria": "cpe:2.3:a:kevin_johnson:basic_analysis_and_security_engine:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7533848B-C871-4113-B211-A507026F95BD" }, { "criteria": "cpe:2.3:a:kevin_johnson:basic_analysis_and_security_engine:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "06B66DBD-535B-4704-A3C0-35E299F07F5B" }, { "criteria": "cpe:2.3:a:kevin_johnson:basic_analysis_and_security_engine:1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "096B0DBE-1C6E-4C91-B0F3-16F52FBEDFDD" }, { "criteria": "cpe:2.3:a:kevin_johnson:basic_analysis_and_security_engine:1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "87ACDA32-560F-427D-A61E-5EDE14D351C9" }, { "criteria": "cpe:2.3:a:kevin_johnson:basic_analysis_and_security_engine:1.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8A36A890-6FF6-42A5-9A99-FB7743D360F8" }, { "criteria": "cpe:2.3:a:kevin_johnson:basic_analysis_and_security_engine:1.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F102F800-F452-48AA-98F0-01B956565915" }, { "criteria": "cpe:2.3:a:kevin_johnson:basic_analysis_and_security_engine:1.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "10AEE525-2F5F-4194-A9D0-D62417D4700F" }, { "criteria": "cpe:2.3:a:kevin_johnson:basic_analysis_and_security_engine:1.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0A85C8C5-0A44-4F85-8E71-252334A0D664" }, { "criteria": "cpe:2.3:a:kevin_johnson:basic_analysis_and_security_engine:1.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6594E7A8-E4E4-4637-B6CC-1D21FAB211A5" }, { "criteria": "cpe:2.3:a:kevin_johnson:basic_analysis_and_security_engine:1.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A1326FC5-FE73-4489-8A4A-85F3B9904C7F" }, { "criteria": "cpe:2.3:a:kevin_johnson:basic_analysis_and_security_engine:1.2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "02C23F76-63F7-4B03-AC57-6817796EF57E" }, { "criteria": "cpe:2.3:a:roman_danyliw:analysis_console_for_intrusion_databases_\\(acid\\):0.9.6b23:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "480953F8-598A-4543-ADC5-C5C170ECA3DC" } ], "operator": "OR" } ] } ]