Faq-O-Matic跨站脚本执行漏洞

Faq-O-Matic跨站脚本执行漏洞

漏洞ID 1106600 漏洞类型 未知
发布时间 2002-02-04 更新时间 2002-05-16
图片[1]-Faq-O-Matic跨站脚本执行漏洞-安全小百科CVE编号 CVE-2002-0230
图片[2]-Faq-O-Matic跨站脚本执行漏洞-安全小百科CNNVD-ID CNNVD-200205-027
漏洞平台 CGI CVSS评分 5.0
|漏洞来源
https://www.exploit-db.com/exploits/21263
https://www.securityfocus.com/bid/82883
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200205-027
|漏洞详情
Faq-O-Matic是一个免费的、开源的FAQ管理工具,它可以运行于大部分的Linux/Unix系统。Faq-O-Matic没有很好过滤URL参数中的脚本代码。如果一个恶意的链接包含了脚本代码,当用户浏览这个恶意链接的时候,用户的浏览器会执行这些代码。远程攻击者可能利用这个漏洞窃取用户基于cookie的验证信息。
|漏洞EXP
source: http://www.securityfocus.com/bid/4023/info

FAQ-O-Matic is a freely available, open-source FAQ (Frequently Asked Questions) manager. It is intended to run on Linux and Unix variants.

FAQ-O-Matic does not sufficiently filter script code from URL parameters. It is possible to create a malicious link containing arbitrary script code. When a legitimate user browses the malicious link, the script code will be executed in the user's browser in the context of the website running Faq-O-Matic.

As a result, it may be possible for a remote attacker to steal cookie-based authentication credentials from a legitimate user of the service.

http://faqomaticsite/cgi-bin/fom/fom.cgi?cmd=<script>alert("superpetz")</script>&file=1&keywords=superpetz
|受影响的产品
FAQ-O-Matic FAQ-O-Matic 2.712
|参考资料

来源:DEBIAN
名称:DSA-109
链接:http://www.debian.org/security/2002/dsa-109
来源:sourceforge.net
链接:http://sourceforge.net/mailarchive/forum.php?thread_id=464940&forum;_id=6367
来源:BUGTRAQ
名称:20020205Faq-O-MaticCross-SiteScripting
链接:http://marc.theaimsgroup.com/?l=bugtraq&m;=101293973111873&w;=2
来源:BUGTRAQ
名称:20020204[SUPERPETZADVISORY#002-Faq-O-MaticCross-SiteScriptingVulnerability]
链接:http://marc.theaimsgroup.com/?l=bugtraq&m;=101285834018701&w;=2

相关推荐: IIS 4.0 fpcount.exe Buffer Overflow Vulnerability

IIS 4.0 fpcount.exe Buffer Overflow Vulnerability 漏洞ID 1104788 漏洞类型 Boundary Condition Error 发布时间 1999-01-14 更新时间 1999-01-14 CVE编号…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享