Ades Design AdesGuestbook Read Script跨站脚本攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1109579 漏洞类型 跨站脚本
发布时间 2005-12-30 更新时间 2007-04-13
CVE编号 CVE-2005-4596 CNNVD-ID CNNVD-200512-915
漏洞平台 PHP CVSS评分 4.3
|漏洞来源
https://www.exploit-db.com/exploits/26992
https://www.securityfocus.com/bid/16090
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200512-915
|漏洞详情
AdesGuestbook2.0的read.php中存在跨站脚本攻击漏洞,远程攻击者可以通过totalRows_rsRead参数注入任意Web脚本或HTML。
|漏洞EXP
source: http://www.securityfocus.com/bid/16090/info

Ades Design AdesGuestbook is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input.

An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks. 

/read.php?pageNum_rsRead=1&totalRows_rsRead=[XSS]
|受影响的产品
Ades Design AdesGuestbook 2.0
|参考资料

来源:SECUNIA
名称:18244
链接:http://secunia.com/advisories/18244
来源:XF
名称:adesguestbook-read-xss(23909)
链接:http://xforce.iss.net/xforce/xfdb/23909
来源:BID
名称:16090
链接:http://www.securityfocus.com/bid/16090
来源:OSVDB
名称:22111
链接:http://www.osvdb.org/22111
来源:MISC
链接:http://pridels0.blogspot.com/2005/12/adesguestbook-xss-vuln.html