Wirtualna Polska WPKontakt远程脚本执行漏洞

Wirtualna Polska WPKontakt远程脚本执行漏洞

漏洞ID 1108386 漏洞类型 跨站脚本
发布时间 2004-12-23 更新时间 2005-10-20
图片[1]-Wirtualna Polska WPKontakt远程脚本执行漏洞-安全小百科CVE编号 CVE-2004-1418
图片[2]-Wirtualna Polska WPKontakt远程脚本执行漏洞-安全小百科CNNVD-ID CNNVD-200412-267
漏洞平台 CGI CVSS评分 4.3
|漏洞来源
https://www.exploit-db.com/exploits/25051
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200412-267
|漏洞详情
WPKontakt3.0.1及其早期版本存在跨站脚本(XSS)漏洞。远程攻击者借助电子邮件地址注入任意web脚本或者HTML,该漏洞在解析错误产生时未被引用。
|漏洞EXP
source: http://www.securityfocus.com/bid/12097/info

WPKontakt is reported prone to a potential script execution vulnerability. It is reported that this issue may allow remote attackers to execute arbitrary script code on a vulnerable computer, which may lead to various attacks. Arbitrary script code may be executed on a target system in the event that a specially message containing a specially malformed email address containing a JavaScript URI is received. 

test@"style="background-image:url(javascript:alert(%22You%20are%20owned!%22>))".wp.pl
|参考资料

来源:BID
名称:12097
链接:http://www.securityfocus.com/bid/12097
来源:BUGTRAQ
名称:20041223WPkontaktmessageparsingerror
链接:http://marc.theaimsgroup.com/?l=bugtraq&m;=110384387332443&w;=2
来源:XF
名称:wpkontakt-email-command-execution(18685)
链接:http://xforce.iss.net/xforce/xfdb/18685

相关推荐: Kaspersky Antivirus (KAV)病毒保护绕过漏洞

Kaspersky Antivirus (KAV)病毒保护绕过漏洞 漏洞ID 1202136 漏洞类型 输入验证 发布时间 2003-12-31 更新时间 2003-12-31 CVE编号 CVE-2003-1443 CNNVD-ID CNNVD-200312…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享