Synthetic Reality SymPoll跨站脚本漏洞

Synthetic Reality SymPoll跨站脚本漏洞

漏洞ID 1107570 漏洞类型 跨站脚本
发布时间 2003-11-03 更新时间 2005-10-20
图片[1]-Synthetic Reality SymPoll跨站脚本漏洞-安全小百科CVE编号 CVE-2003-1175
图片[2]-Synthetic Reality SymPoll跨站脚本漏洞-安全小百科CNNVD-ID CNNVD-200312-231
漏洞平台 PHP CVSS评分 6.8
|漏洞来源
https://www.exploit-db.com/exploits/23330
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200312-231
|漏洞详情
Sympoll1.5版本的index.php存在跨站脚本漏洞。远程攻击者借助vo参数注入任意web脚本或者HTML。
|漏洞EXP
source: http://www.securityfocus.com/bid/8956/info

It has been reported that Sympoll is prone to a cross-site scripting vulnerability. The issue is reported to exist due insufficient sanitization of user-supplied data through the 'vo' parameter. The problem may allow a remote attacker to execute HTML or script code in the browser of a user following a malicious link created by an attacker.

Successful exploitation of this attack may allow an attacker to steal cookie-based authentication information that could be used to launch further attacks.

Sympoll version 1.5 is reported to be prone to this issue, however other versions may be affected as well.

http://www.example.com/index.php?vo="><script>alert(document.cookie);</script>
|参考资料

来源:XF
名称:sympoll-indexphp-xss(13630)
链接:http://xforce.iss.net/xforce/xfdb/13630
来源:BID
名称:8956
链接:http://www.securityfocus.com/bid/8956
来源:OSVDB
名称:2790
链接:http://www.osvdb.org/2790
来源:sourceforge.net
链接:http://sourceforge.net/tracker/index.php?func=detail&aid;=834374&group;_id=64442&atid;=507493
来源:SECUNIA
名称:10165
链接:http://secunia.com/advisories/10165

相关推荐: RealNetwork RealPlayer EMBD3260.DLL Error Response Heap Overflow Vulnerability

RealNetwork RealPlayer EMBD3260.DLL Error Response Heap Overflow Vulnerability 漏洞ID 1098290 漏洞类型 Boundary Condition Error 发布时间 200…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享