NukeET Base64 Codigo变量跨站脚本攻击漏洞

NukeET Base64 Codigo变量跨站脚本攻击漏洞

漏洞ID 1108772 漏洞类型 跨站脚本
发布时间 2005-05-10 更新时间 2005-10-20
图片[1]-NukeET Base64 Codigo变量跨站脚本攻击漏洞-安全小百科CVE编号 CVE-2005-1610
图片[2]-NukeET Base64 Codigo变量跨站脚本攻击漏洞-安全小百科CNNVD-ID CNNVD-200505-1065
漏洞平台 PHP CVSS评分 6.8
|漏洞来源
https://www.exploit-db.com/exploits/25642
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200505-1065
|漏洞详情
Tru-ZoneNukeET3.0及3.1版本的security.php存在跨站脚本攻击(XSS)漏洞,远程攻击者可通过base64编码的Codigo参数来注入任意Web脚本或HTML。
|漏洞EXP
source: http://www.securityfocus.com/bid/13570/info

NukeET is prone to a cross-site scripting vulnerability.

The source of this issue is that HTML and script code is not properly sanitized from URI variables before being output in a dynamically generated Web page. However, to successfully trigger the issue, HTML and script code may be Base64-encoded when passed as a URI variable argument.

An attacker may exploit the issue by enticing a user to following a link that includes hostile Base64-encoded HTML and script code. The malicious input will be decoded by the application and may then be rendered in the browser of the user who visits the link.

The following Base64-encoded string is equivalent to <script>alert()</script><h1>XSS PoW@ !!!</h1>:

PHNjcmlwdD5hbGVydCgpPC9zY3JpcHQ+PGgxPlhTUyBQb1dAICEhITwvaDE+

http://www.example.com/security.php?codigo=
PHNjcmlwdD5hbGVydCgpPC9zY3JpcHQ+PGgxPlhTUyBQb1dAICEhITwvaDE+
|参考资料

来源:BID
名称:13570
链接:http://www.securityfocus.com/bid/13570
来源:OSVDB
名称:16214
链接:http://www.osvdb.org/16214
来源:SECTRACK
名称:1013936
链接:http://securitytracker.com/id?1013936
来源:MISC
链接:http://lostmon.blogspot.com/2005/05/nukeet-codigo-variable-cross-site.html
来源:XF
名称:nukeet-securityphp-xss(20540)
链接:http://xforce.iss.net/xforce/xfdb/20540
来源:SECUNIA
名称:15332
链接:http://secunia.com/advisories/15332

相关推荐: InterAccess TelnetD Server远程缓冲区溢出漏洞

InterAccess TelnetD Server远程缓冲区溢出漏洞 漏洞ID 1105716 漏洞类型 边界条件错误 发布时间 2000-02-21 更新时间 2005-05-02 CVE编号 CVE-2000-0166 CNNVD-ID CNNVD-20…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享