CVE-2007-1926

N/A Unknown
Published: April 10, 2007 Modified: December 16, 2025

Description

Cross-site scripting (XSS) vulnerability in JBMC Software DirectAdmin before 1.293 does not properly display log files, which allows remote authenticated users to inject arbitrary web script or HTML via (1) http or (2) ftp requests logged in /var/log/directadmin/security.log; (3) allows context-dependent attackers to inject arbitrary web script or HTML into /var/log/messages via a PHP script that invokes /usr/bin/logger; (4) allows local users to inject arbitrary web script or HTML into /var/log/messages by invoking /usr/bin/logger at the command line; and allows remote attackers to inject arbitrary web script or HTML via remote requests logged in the (5) /var/log/exim/rejectlog, (6) /var/log/exim/mainlog, (7) /var/log/proftpd/auth.log, (8) /var/log/httpd/error_log, (9) /var/log/httpd/access_log, (10) /var/log/directadmin/error.log, and (11) /var/log/directadmin/security.log files.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/24728
Source: cve@mitre.org
Exploit Patch Vendor Advisory
http://securityreason.com/securityalert/2534
Source: cve@mitre.org
Third Party Advisory
http://www.directadmin.com/features.php?id=760
Source: cve@mitre.org
Release Notes
http://www.directadmin.com/versions.php
Source: cve@mitre.org
Patch
http://www.securityfocus.com/bid/23254
Source: cve@mitre.org
Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/33390
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/24728
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Patch Vendor Advisory
http://securityreason.com/securityalert/2534
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.directadmin.com/features.php?id=760
Source: af854a3a-2127-422b-91ae-364da2661108
Release Notes
http://www.directadmin.com/versions.php
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.securityfocus.com/archive/1/464471/100/100/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.securityfocus.com/bid/23254
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/33390
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory

14 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
1.3%
80th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

directadmin