xNewsletter 1.0 – Form Field Input Validation
漏洞ID | 1053575 | 漏洞类型 | |
发布时间 | 2002-04-14 | 更新时间 | 2002-04-14 |
CVE编号 | N/A |
CNNVD-ID | N/A |
漏洞平台 | PHP | CVSS评分 | N/A |
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/4516/info
xNewsletter is a script that allows web users to subscribe to a newsletter. It is written in PHP and will run on most Unix and Linux variants, as well as Microsoft Windows operating systems.
xNewsletter does not sanitize dangerous characters from form field input such as the e-mail address of the newsletter recipient. It has been demonstrated that this condition may be exploited to cause multiple instances of the same e-mail address to be written to the datafile. An attacker may effectively trick the script into mail bombing an arbitrary e-mail address.
It has also been demonstrated that the attacker may cause arbitrary data to be written to the datafile in such a way that it cannot be removed using the facilities provided by xNewsletter. The malformed data must be removed from the datafile manually.
These two consequences of insufficent validation of form input may be exploited in conjunction with each other.
Subscribe with the following code to create an almost undeletable
entry:
<?php inlcude("text.txt");?>[email protected]
Subscribe with the following address to add an address more than one time:
([email protected])%[email protected]%[email protected]%[email protected]
相关推荐: HP SNMPD File Permission Vulnerabilities
HP SNMPD File Permission Vulnerabilities 漏洞ID 1104119 漏洞类型 Access Validation Error 发布时间 2000-06-07 更新时间 2000-06-07 CVE编号 N/A CNNVD…
© 版权声明
文章版权归作者所有,未经允许请勿转载。
THE END
喜欢就支持一下吧
恐龙抗狼扛1年前0
kankan啊啊啊啊3年前0
66666666666666