Open Solution Quick.Cart Index.PHP跨站脚本攻击漏洞

Open Solution Quick.Cart Index.PHP跨站脚本攻击漏洞

漏洞ID 1108776 漏洞类型 跨站脚本
发布时间 2005-05-11 更新时间 2005-10-20
图片[1]-Open Solution Quick.Cart Index.PHP跨站脚本攻击漏洞-安全小百科CVE编号 CVE-2005-1587
图片[2]-Open Solution Quick.Cart Index.PHP跨站脚本攻击漏洞-安全小百科CNNVD-ID CNNVD-200505-1017
漏洞平台 PHP CVSS评分 4.3
|漏洞来源
https://www.exploit-db.com/exploits/25650
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200505-1017
|漏洞详情
Quick.cart0.3.0中的index.php存在跨站脚本攻击(XSS)漏洞,远程攻击者可通过sWord参数注入任意Web脚本或HTML。
|漏洞EXP
source: http://www.securityfocus.com/bid/13599/info

Quick.Cart is prone to a cross-site scripting vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.

An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.

This issue is reported to affect Quick.Cart version 0.3.0; other versions may also be affected. 

http://www.example.com/?p=productsList&sWord=%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E
http://www.example.com/index.php?p=productsList&sWord=%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E
|参考资料

来源:BID
名称:13599
链接:http://www.securityfocus.com/bid/13599
来源:OSVDB
名称:16330
链接:http://www.osvdb.org/16330
来源:SECUNIA
名称:15297
链接:http://secunia.com/advisories/15297
来源:MISC
链接:http://lostmon.blogspot.com/2005/05/quickcart-sword-variable-xss-and.html
来源:opensolution.org
链接:http://opensolution.org/forum/?p=readTopic&nr;=948

相关推荐: Karrigell KS File Arbitrary Python Command Execution Vulnerability

Karrigell KS File Arbitrary Python Command Execution Vulnerability 漏洞ID 1096178 漏洞类型 Design Error 发布时间 2005-07-31 更新时间 2005-07-31 …

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享