Linksys Web Camera Software Next_file参数跨站脚本漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1107997 漏洞类型 跨站脚本
发布时间 2004-06-14 更新时间 2006-01-25
CVE编号 CVE-2004-2508 CNNVD-ID CNNVD-200412-280
漏洞平台 CGI CVSS评分 4.3
|漏洞来源
https://www.exploit-db.com/exploits/24197
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200412-280
|漏洞详情
LinksysWVC11BWireless-BInternetVideoCamera的main.cgi存在跨站脚本漏洞。远程攻击者借助next_file参数注入任意web脚本或者HTML。
|漏洞EXP
source: http://www.securityfocus.com/bid/10533/info

It is reported that Linksys Web Camera software is prone to a cross-site scripting vulnerability that may allow a remote attacker to steal cookie-based authentication credentials or carry out other attacks.

The problem presents itself when an attacker passes malicious HTML or script code to the application via the 'next_file' parameter of the 'main.cgi' script.

Linksys Web Camera software version 2.10 is reportedly prone to this issue, however, it is possible that other versions are affected as well.

http://www.example.com/main.cgi?next_file=poop<script>alert('scriptX :P');</script>
|参考资料

来源:XF
名称:linksys-webcamera-main-xss(16415)
链接:http://xforce.iss.net/xforce/xfdb/16415
来源:BID
名称:10533
链接:http://www.securityfocus.com/bid/10533
来源:SECTRACK
名称:1010424
链接:http://securitytracker.com/id?1010424
来源:SECUNIA
名称:11881
链接:http://secunia.com/advisories/11881
来源:BUGTRAQ
名称:20040613LinksysWebCameraCross-siteScriptingVuln
链接:http://archives.neohapsis.com/archives/bugtraq/2004-06/0215.html