CVE-2005-4426

Interpretation conflict in YaBB before 2.1 allows remote authenticated users to inject arbitrary web script or HTML via HTML in a file with a GIF file extension, which causes the HTML to be executed by a victim who views the file in Internet Explorer as a result of CVE-2005-3312. NOTE: it could be argued that this vulnerability is due to a design flaw in Internet Explorer and the proper fix should be in that browser; if so, then this should not be treated as a vulnerability in YaBB.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:yabb:yabb:1.40:*:*:*:*:*:*:*
cpe:2.3:a:yabb:yabb:1.41:*:*:*:*:*:*:*
cpe:2.3:a:yabb:yabb:1_gold_-_sp_1:*:*:*:*:*:*:*
cpe:2.3:a:yabb:yabb:1_gold_-_sp_1.2:*:*:*:*:*:*:*
cpe:2.3:a:yabb:yabb:1_gold_-_sp_1.3:*:*:*:*:*:*:*
cpe:2.3:a:yabb:yabb:1_gold_-_sp_1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:yabb:yabb:1_gold_-_sp_1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:yabb:yabb:1_gold_-_sp_1.4:*:*:*:*:*:*:*
cpe:2.3:a:yabb:yabb:1_gold_release:*:*:*:*:*:*:*
cpe:2.3:a:yabb:yabb:2.0:*:*:*:*:*:*:*
cpe:2.3:a:yabb:yabb:2.0_rc1:*:*:*:*:*:*:*
cpe:2.3:a:yabb:yabb:2.0_rc2:*:*:*:*:*:*:*

History

21 Nov 2024, 00:04

Type Values Removed Values Added
References () http://secunia.com/advisories/17411 - Patch, Vendor Advisory () http://secunia.com/advisories/17411 - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/15368 - Patch () http://www.securityfocus.com/bid/15368 - Patch
References () http://www.yabbforum.com/downloads.php - Patch () http://www.yabbforum.com/downloads.php - Patch
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/23020 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/23020 -

Information

Published : 2005-12-20 11:03

Updated : 2024-11-21 00:04


NVD link : CVE-2005-4426

Mitre link : CVE-2005-4426

CVE.ORG link : CVE-2005-4426


JSON object : View

Products Affected

yabb

  • yabb