PHP-Nuke Splatt Forum 4.0 Module – HTML Injection

PHP-Nuke Splatt Forum 4.0 Module – HTML Injection

漏洞ID 1053860 漏洞类型
发布时间 2003-05-01 更新时间 2003-05-01
图片[1]-PHP-Nuke Splatt Forum 4.0 Module – HTML Injection-安全小百科CVE编号 N/A
图片[2]-PHP-Nuke Splatt Forum 4.0 Module – HTML Injection-安全小百科CNNVD-ID N/A
漏洞平台 PHP CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/22558
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/7484/info

A problem with Splatt Forum could allow remote users to execute arbitrary code in the context of the web site running the Splatt Forum module. The problem occurs due to the lack of sanitization performed on character representations of HTML tags.

As a result, a malicious user may be able to submit a post to the vulnerable site containing embedded script code. This code would be executed by a user's browser in the context of the site.

This issue may be exploited to steal cookie-based authentication credentials from legitimate users of the website running the vulnerable software. The attacker may hijack the session of the legitimate by using cookie-based authentication credentials. Other attacks are also possible.

It should be noted that although this vulnerability has been reported to affect Splatt Forum version 4.0, previous versions may also be affected. 

#
Typical text here <script>alert(document.cookie);</script> additional text here.
#

相关推荐: GoAhead WebServer Remote Arbitrary Command Execution Vulnerability

GoAhead WebServer Remote Arbitrary Command Execution Vulnerability 漏洞ID 1101664 漏洞类型 Boundary Condition Error 发布时间 2002-08-14 更新时间…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享