Mojo Mail电子邮件形式跨站脚本漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1107064 漏洞类型 跨站脚本
发布时间 2002-10-24 更新时间 2006-03-17
CVE编号 CVE-2002-2193 CNNVD-ID CNNVD-200212-773
漏洞平台 CGI CVSS评分 4.3
|漏洞来源
https://www.exploit-db.com/exploits/21962
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200212-773
|漏洞详情
MojoMail2.7版本中的mojo.cgi存在跨站脚本(XSS)漏洞。远程攻击者可以通过email参数注入任意web脚本。
|漏洞EXP
source: http://www.securityfocus.com/bid/6040/info

Mojo Mail does not filter HTML tags from URI parameters, making it prone to cross-site scripting attacks.

As a result, it is possible for a remote attacker to create a malicious link containing script code which will be executed in the browser of a legitimate user, in the context of the website running Mojo Mail.

This issue may be exploited to steal cookie-based authentication credentials from legitimate users of the website running the vulnerable software. 

http://www.example.com/cgi-bin/mojo/mojo.cgi?flavor=subscribe&email=%3Cscript%3Ealert%28%22XSS%20Vuln.%22%29%3C%2Fscript%3E&list=skazat_design_newsletter&submit=Submit
|参考资料

来源:BID
名称:6040
链接:http://www.securityfocus.com/bid/6040
来源:XF
名称:mojo-mail-mojo-xss(10477)
链接:http://www.iss.net/security_center/static/10477.php
来源:BUGTRAQ
名称:20021024XSSvulnerabilityinMojoMailSign-UpForm
链接:http://archives.neohapsis.com/archives/bugtraq/2002-10/0352.html