Uapplication Ublog Reload 'Trackback.ASP'跨站脚本攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1108878 漏洞类型 跨站脚本
发布时间 2005-06-20 更新时间 2006-09-22
CVE编号 CVE-2005-2010 CNNVD-ID CNNVD-200506-197
漏洞平台 ASP CVSS评分 4.3
|漏洞来源
https://www.exploit-db.com/exploits/25845
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200506-197
|漏洞详情
UblogReload1.0.5中的trackback..asp存在跨站脚本攻击(XSS)漏洞,远程攻击者可借助btitle参数来注入任意Web脚本或HTML。
|漏洞EXP
source: http://www.securityfocus.com/bid/13994/info

Ublog Reload is prone to a cross-site scripting vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.

An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may facilitate the theft of cookie-based authentication credentials as well as other attacks. 

http://www.example.com/UblogReload/trackback.asp?bi=[id]&btitle=[XSS]&mode=view
http://www.example.com/UblogReload/trackback.asp?bi=343&btitle=<script>alert('document.cookie')</script>&mode=view
|参考资料

来源:VUPEN
名称:ADV-2005-0818
链接:http://www.frsirt.com/english/advisories/2005/0818
来源:BID
名称:13994
链接:http://www.securityfocus.com/bid/13994
来源:BUGTRAQ
名称:20050620[ECHO_ADV_18$2005]MultipleSQLINJECTIONinUblogReload1.0.5
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=111928552304897&w=2
来源:MISC
链接:http://echo.or.id/adv/adv18-theday-2005.txt