Description
Cross-site scripting (XSS) vulnerability in cpaint2.inc.php in the CPAINT library before 2.0.3, as used in multiple scripts, allows remote attackers to inject arbitrary web script or HTML via the cpaint_response_type parameter, which is displayed in a resulting error message, as demonstrated using a hex-encoded IFRAME tag.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by GulfTech Security · textwebappsphp
https://www.exploit-db.com/exploits/27173
References (8)
Core 8
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://securitytracker.com/id?1015608
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/424663/100/0/threaded
Exploit, Patch, Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/18765
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/24594
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/16559
Exploit x_refsource_confirm
http://cpaint.booleansystems.com/forums/viewtopic.php?t=98
Exploit, Patch, Vendor Advisory x_refsource_misc
http://www.gulftech.org/?node=research&article_id=00097-02092006
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2006/0487
Scores
EPSS
0.0158
EPSS Percentile
81.7%
Details
Status
published
Products (10)
cpaint/cpaint
1.0
cpaint/cpaint
1.01
cpaint/cpaint
1.2
cpaint/cpaint
1.3
cpaint/cpaint
1.3_sp
cpaint/cpaint
1.3_sp1
cpaint/cpaint
2.0.0
cpaint/cpaint
2.0.1
cpaint/cpaint
2.0.2
cpaint/cpaint
pre1.0
Published
Feb 13, 2006
Tracked Since
Feb 18, 2026