| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 3.8 | $0-$5k | 0.00 |
Summary
A vulnerability was found in Clever Copy 2.0 and classified as problematic. This issue affects some unknown processing of the file stats/script.php. Executing a manipulation can lead to cross site scripting. This vulnerability appears as CVE-2006-0627. The attack may be performed from remote. There is no available exploit.
Details
A vulnerability classified as problematic was found in Clever Copy 2.0. This vulnerability affects an unknown code of the file stats/script.php. The manipulation with an unknown input leads to a cross site scripting vulnerability. The CWE definition for the vulnerability is CWE-80. The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special characters such as "<", ">", and "&" that could be interpreted as web-scripting elements when they are sent to a downstream component that processes web pages. As an impact it is known to affect integrity. CVE summarizes:
Cross-site scripting (XSS) vulnerability in Clever Copy 2.0, 2.0a, and 3.0 allows remote attackers to inject arbitrary web script or HTML via the (1) Referer or (2) X-Forwarded-For headers in an HTTP request, which are not properly handled when the administrator accesses Site Stats.
The weakness was presented 02/09/2006 by Aliaksandr Hartsuyeu as confirmed posting (Bugtraq). The advisory is shared for download at securityfocus.com. This vulnerability was named CVE-2006-0627 since 02/09/2006. The attack can be initiated remotely. No form of authentication is required for a successful exploitation. Successful exploitation requires user interaction by the victim. There are known technical details, but no exploit is available. The MITRE ATT&CK project declares the attack technique as T1059.007.
It is declared as proof-of-concept. By approaching the search of inurl:stats/script.php it is possible to find vulnerable targets with Google Hacking.
The vulnerability is also documented in the databases at X-Force (24524), SecurityFocus (BID 16607†) and Secunia (SA18790†). VulDB is the best source for vulnerability data and more expert information about this specific topic.
Product
Name
Version
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 4.3VulDB Meta Temp Score: 3.8
VulDB Base Score: 4.3
VulDB Temp Score: 3.8
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Cross site scriptingCWE: CWE-80 / CWE-74 / CWE-707
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Proof-of-Concept
Google Hack: 🔍
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: no mitigation knownStatus: 🔍
0-Day Time: 🔍
Timeline
02/09/2006 🔍02/09/2006 🔍
02/09/2006 🔍
02/10/2006 🔍
02/13/2006 🔍
03/12/2015 🔍
09/11/2017 🔍
Sources
Advisory: securityfocus.com⛔Researcher: Aliaksandr Hartsuyeu
Status: Confirmed
CVE: CVE-2006-0627 (🔍)
GCVE (CVE): GCVE-0-2006-0627
GCVE (VulDB): GCVE-100-28648
X-Force: 24524 - Clever Copy stats/script.php cross-site scripting
SecurityFocus: 16607 - Clever Copy Multiple HTML Injection Vulnerabilities
Secunia: 18790 - Clever Copy HTTP Headers Script Insertion Vulnerabilities, Moderately Critical
Vupen: ADV-2006-0495
Entry
Created: 03/12/2015 11:11Updated: 09/11/2017 20:52
Changes: 03/12/2015 11:11 (57), 09/11/2017 20:52 (2)
Complete: 🔍
Cache ID: 216::103
VulDB is the best source for vulnerability data and more expert information about this specific topic.
No comments yet. Languages: en.
Please log in to comment.