PostNuke 多处跨站脚本攻击漏洞

PostNuke 多处跨站脚本攻击漏洞

漏洞ID 1200087 漏洞类型 跨站脚本
发布时间 2005-02-28 更新时间 2005-02-28
图片[1]-PostNuke 多处跨站脚本攻击漏洞-安全小百科CVE编号 CVE-2005-0616
图片[2]-PostNuke 多处跨站脚本攻击漏洞-安全小百科CNNVD-ID CNNVD-200502-099
漏洞平台 N/A CVSS评分 4.3
|漏洞来源
https://www.securityfocus.com/bid/82436
https://cxsecurity.com/issue/WLB-2005090035
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200502-099
|漏洞详情
PostNuke简称PN,是一个由PHP编写的内容管理系统。PostNuke0.750和0.760-RC2的下载模块中的多个跨站脚本攻击(XSS)漏洞,可让远程攻击者通过以下方式注入任意Web脚本或HTML:(1)程序名称、(2)文件链接、(3)作者名称、(4)作者电子邮件地址、(5)文件大小、(6)版本或(7)主页变量。
|漏洞EXP
PostNuke Critical XSS 0.760-RC2=>x cXIb8O3.2]

Author: Maksymilian Arciemowic
Date: 19.2.2005

- --- 0.Description ---

PostNuke: The Phoenix Release (0.750) and (0.760-RC2)

PostNuke is an open source, open developement content management system
(CMS). PostNuke started as a fork from PHPNuke (http://www.phpnuke.org) and
provides many enhancements and improvements over the PHP-Nuke system. PostNuke
is still undergoing development but a large number of core functions are now
stabilising and a complete API for third-party developers is now in place.
If you would like to help develop this software, please visit our homepage
at http://noc.postnuke.com/
You can also visit us on our IRC Server irc.postnuke.com channel
#postnuke-support
#postnuke-chat
#postnuke
Or at the Community Forums located at:
http://forums.postnuke.com/


- --- 1. Critical XSS in Download module ---
When we go to this url :


http://[HOST]/[DIR]/modules.php?op=modload&name=Downloads&file=index&req=AddDownload

or

We can add XSS by passing unexpected data to the 'Program name' or 'File link' or 'Author s
name' or 'Author s e-mail address' or 'File size' or 'Version' or 'Home page' variable.

For exemple:

"><script>alert('cXIb8O3');</script>


Why this XSS is critical ?
Because when admin login in and try to view new downloads, then our XSS will run on his
machine.
Evil attacker can create dangerous XSS to steal data (admin cookie with session) or change the
site.

- --- 2. How to fix ---

Download the new version of the script or update.


- --- 3.Contact ---
Author: Maksymilian Arciemowicz
|受影响的产品
PostNuke Development Team PostNuke 0.76 RC2

PostNuke Development Team PostNuke 0.75

|参考资料

来源:SECTRACK
名称:1013324
链接:http://securitytracker.com/id?1013324
来源:news.postnuke.com
链接:http://news.postnuke.com/Article2669.html
来源:BUGTRAQ
名称:20050228[SECURITYREASON.COM]PostNukeCriticalXSS0.760-RC2=>xcXIb8O3.2
链接:http://marc.theaimsgroup.com/?l=bugtraq&m;=110962768300373&w;=2

相关推荐: Coppermine Photo Gallery PHP Code Injection Vulnerability

Coppermine Photo Gallery PHP Code Injection Vulnerability 漏洞ID 1100555 漏洞类型 Unknown 发布时间 2003-04-07 更新时间 2003-04-07 CVE编号 N/A CNNV…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享