xNewsletter 1.0 – Form Field Input Validation

xNewsletter 1.0 – Form Field Input Validation

漏洞ID 1053575 漏洞类型
发布时间 2002-04-14 更新时间 2002-04-14
图片[1]-xNewsletter 1.0 – Form Field Input Validation-安全小百科CVE编号 N/A
图片[2]-xNewsletter 1.0 – Form Field Input Validation-安全小百科CNNVD-ID N/A
漏洞平台 PHP CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/21383
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/4516/info

xNewsletter is a script that allows web users to subscribe to a newsletter. It is written in PHP and will run on most Unix and Linux variants, as well as Microsoft Windows operating systems.

xNewsletter does not sanitize dangerous characters from form field input such as the e-mail address of the newsletter recipient. It has been demonstrated that this condition may be exploited to cause multiple instances of the same e-mail address to be written to the datafile. An attacker may effectively trick the script into mail bombing an arbitrary e-mail address.

It has also been demonstrated that the attacker may cause arbitrary data to be written to the datafile in such a way that it cannot be removed using the facilities provided by xNewsletter. The malformed data must be removed from the datafile manually.

These two consequences of insufficent validation of form input may be exploited in conjunction with each other. 

Subscribe with the following code to create an almost undeletable
entry:
<?php inlcude("text.txt");?>[email protected]

Subscribe with the following address to add an address more than one time:
([email protected])%[email protected]%[email protected]%[email protected]

相关推荐: HP SNMPD File Permission Vulnerabilities

HP SNMPD File Permission Vulnerabilities 漏洞ID 1104119 漏洞类型 Access Validation Error 发布时间 2000-06-07 更新时间 2000-06-07 CVE编号 N/A CNNVD…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享