PHPKIT远程SQL注入跨站脚本漏洞

PHPKIT远程SQL注入跨站脚本漏洞

漏洞ID 1108288 漏洞类型 输入验证
发布时间 2004-11-22 更新时间 2005-10-20
图片[1]-PHPKIT远程SQL注入跨站脚本漏洞-安全小百科CVE编号 CVE-2004-1537
图片[2]-PHPKIT远程SQL注入跨站脚本漏洞-安全小百科CNNVD-ID CNNVD-200412-228
漏洞平台 PHP CVSS评分 4.3
|漏洞来源
https://www.exploit-db.com/exploits/24762
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200412-228
|漏洞详情
PHPKIT是一套基于Web的内容管理系统(CMS)。该系统提供论坛、留言板等模块。PHPKIT对用户提交的URL参数缺少充分过滤,远程攻击者可以利用这个漏洞获得敏感信息,或者对数据库进行操作。’include.php’脚本对用户提交的参数数据缺少充分过滤,提交包含恶意SQL命令的数据作为参数,可更改原来的SQL逻辑,可能获得敏感信息或操作数据库。另外对部分HTML恶意数据也缺少过滤,构建恶意链接,可导致基于验证的COOKIE信息泄露。
|漏洞EXP
source: http://www.securityfocus.com/bid/11725/info

It is reported that PHPKIT is susceptible to cross-site scripting and SQL injection vulnerabilities.

The cross-site scripting issue is present in a parameter of the 'popup.php' script. An attacker can exploit this issue by creating a malicious link containing HTML and script code and send this link to a vulnerable user. This can allow for theft of cookie-based authentication credentials and other attacks.

An SQL injection issue exists in the application as well. This issue affects a parameter of the 'print.php' script. Due to this, attackers may supply malicious parameters to manipulate the structure and logic of SQL queries.

http://www.example.com/phpkit/popup.php?img="><script>alert(document.cookie)</script>
http://www.example.com/phpkit/include.php?path=guestbook/print.php&id=1'
|参考资料

来源:XF
名称:phpkit-popup-xss(18204)
链接:http://xforce.iss.net/xforce/xfdb/18204
来源:BID
名称:11725
链接:http://www.securityfocus.com/bid/11725
来源:SECUNIA
名称:13262
链接:http://secunia.com/advisories/13262
来源:BUGTRAQ
名称:20041122PHPKITSQLInjection,XSS
链接:http://marc.theaimsgroup.com/?l=bugtraq&m;=110117116115493&w;=2
来源:NSFOCUS
名称:7148
链接:http://www.nsfocus.net/vulndb/7148

相关推荐: Microsoft Windows 2000 Network DDE Escalated Privileges Vulnerability

Microsoft Windows 2000 Network DDE Escalated Privileges Vulnerability 漏洞ID 1103522 漏洞类型 Access Validation Error 发布时间 2001-02-05 更新…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享