CuteNews ‘index.php’跨站脚本漏洞

CuteNews ‘index.php’跨站脚本漏洞

漏洞ID 1108168 漏洞类型 跨站脚本
发布时间 2004-09-02 更新时间 2005-10-20
图片[1]-CuteNews ‘index.php’跨站脚本漏洞-安全小百科CVE编号 CVE-2004-1659
图片[2]-CuteNews ‘index.php’跨站脚本漏洞-安全小百科CNNVD-ID CNNVD-200409-008
漏洞平台 PHP CVSS评分 4.3
|漏洞来源
https://www.exploit-db.com/exploits/24566
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200409-008
|漏洞详情
CuteNews1.3.6及其早期版本的index.php存在跨站脚本漏洞。有管理员,编辑,记者或者评论家特权的远程攻击者借助mod参数注入任意web脚本或者HTML。
|漏洞EXP
source: http://www.securityfocus.com/bid/11097/info

It is reported that CuteNews is affected by a cross-site scripting vulnerability. This issue is due to a failure of the application to properly sanitize user-supplied URI input.

This issue could permit a remote attacker to create a malicious URI link that includes hostile HTML and script code. If this link were to be followed, the hostile code may be rendered in the web browser of the victim user. This would occur in the security context of the affected web site and may allow for theft of cookie-based authentication credentials or other attacks.

This vulnerability is reported to exist in versions 1.3.6 and prior of CuteNews.

http://www.example.com/cutenews/index.php?mod=[XSS CODE]
http://www.example.com/cutenews/index.php?mod=<script>alert(document.cookie)</script>
|参考资料

来源:XF
名称:cutenews-mod-xss(17214)
链接:http://xforce.iss.net/xforce/xfdb/17214
来源:BID
名称:11097
链接:http://www.securityfocus.com/bid/11097
来源:SECUNIA
名称:12432
链接:http://secunia.com/advisories/12432
来源:BUGTRAQ
名称:20040902[hackgen-2004-#001]-Non-critacalCross-SiteScriptingbuginCuteNews
链接:http://marc.theaimsgroup.com/?l=bugtraq&m;=109415338521881&w;=2

相关推荐: SWSoft Confixx Change User SQL Injection Vulnerability

SWSoft Confixx Change User SQL Injection Vulnerability 漏洞ID 1096855 漏洞类型 Input Validation Error 发布时间 2005-04-25 更新时间 2005-04-25 CV…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享