Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in Sage 1.3.6 allow remote attackers to inject arbitrary web script or HTML via JavaScript in a content:encoded element within an item element in an RSS feed, as demonstrated by four example content:encoded elements that use XMLHttpRequest to read arbitrary local files, aka "Cross Context Scripting."
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sage | Sage | 1.3.6 |
Related Weaknesses (CWE)
References
- http://downloads.securityfocus.com/vulnerabilities/exploits/sage-inputvalidationExploit
- http://secunia.com/advisories/21839Vendor Advisory
- http://securityreason.com/securityalert/1558
- http://www.gnucitizen.org/blog/cross-context-scripting-with-sage
- http://www.intertwingly.net/blog/2006/08/09/Attack-Delivery-TestSuite
- http://www.securityfocus.com/archive/1/445648/100/0/threaded
- http://www.securityfocus.com/bid/19928Exploit
- http://www.snellspace.com/wp/?p=410
- http://www.snellspace.com/wp/?p=448
- http://www.vupen.com/english/advisories/2006/3553Vendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28855
- http://downloads.securityfocus.com/vulnerabilities/exploits/sage-inputvalidationExploit
- http://secunia.com/advisories/21839Vendor Advisory
- http://securityreason.com/securityalert/1558
- http://www.gnucitizen.org/blog/cross-context-scripting-with-sage
FAQ
What is CVE-2006-4712?
CVE-2006-4712 is a vulnerability with a CVSS score of 6.8 (MEDIUM). Multiple cross-site scripting (XSS) vulnerabilities in Sage 1.3.6 allow remote attackers to inject arbitrary web script or HTML via JavaScript in a content:encoded element within an item element in an...
How severe is CVE-2006-4712?
CVE-2006-4712 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-4712?
Check the references section above for vendor advisories and patch information. Affected products include: Sage Sage.