ASP-Nuke ‘language_select.asp’ HTTP响应拆分漏洞

ASP-Nuke ‘language_select.asp’ HTTP响应拆分漏洞

漏洞ID 1108894 漏洞类型 输入验证
发布时间 2005-06-27 更新时间 2005-10-20
图片[1]-ASP-Nuke ‘language_select.asp’ HTTP响应拆分漏洞-安全小百科CVE编号 CVE-2005-2065
图片[2]-ASP-Nuke ‘language_select.asp’ HTTP响应拆分漏洞-安全小百科CNNVD-ID CNNVD-200506-219
漏洞平台 ASP CVSS评分 5.0
|漏洞来源
https://www.exploit-db.com/exploits/25907
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200506-219
|漏洞详情
ASP-Nuke是一款开放源码的软件应用,可在WebServer上运行基于社区的站点。ASP-Nuke中存在HTTP响应拆分漏洞,成功利用这个漏洞的攻击者可以影响或误导保存、缓存或解释Web内容的方式。起因是没有正确的过滤用户输入。请看/module/support/language/language_select.asp第31行代码:…IfsteForm(“action”)=”go”Then’makesuretherequiredfieldsarepresentIfTrim(steForm(“LangCode”))=””ThensErrorMsg=steGetText(“Pleaseselectalanguagefromthelistbelow”)Else’redirecttothelanguageadministrationResponse.Redirect”tran_list.asp?langcode=”&steEncForm(“LangCode”)EndIfEndIf…?>在重新定向时,由于没有过滤攻击者可能执行CRLF注入攻击。
|漏洞EXP
source: http://www.securityfocus.com/bid/14063/info

ASPNuke is prone to an HTTP response splitting vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.

A remote attacker may exploit this vulnerability to influence or misrepresent how Web content is served, cached or interpreted. This could aid in various attacks that attempt to entice client users into a false sense of trust. 

http://www.example.com/module/support/language/language_select.asp?action=go&LangCode=trivero%0d%0aSet-Cookie%3Asome%3Dvalue
|参考资料

来源:BID
名称:14063
链接:http://www.securityfocus.com/bid/14063
来源:BUGTRAQ
名称:20050626M4DR007-07SA(securityadvisory):MultiplevulnerabilitiesinASPNuke0.80
链接:http://marc.theaimsgroup.com/?l=bugtraq&m;=111989223906484&w;=2

相关推荐: Netscape Communicator服务拒绝漏洞

Netscape Communicator服务拒绝漏洞 漏洞ID 1203456 漏洞类型 未知 发布时间 2002-12-31 更新时间 2002-12-31 CVE编号 CVE-2002-2308 CNNVD-ID CNNVD-200212-196 漏洞平…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享