Bit 5 Blog AddComment.PHP 跨站脚本攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1109642 漏洞类型 跨站脚本
发布时间 2006-01-16 更新时间 2006-06-01
CVE编号 CVE-2006-0361 CNNVD-ID CNNVD-200601-298
漏洞平台 PHP CVSS评分 4.3
|漏洞来源
https://www.exploit-db.com/exploits/27085
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200601-298
|漏洞详情
Bit5Blog8.01的addcomment.php中存在跨站脚本攻击(XSS)漏洞,远程攻击者可以通过评论参数中标记内的javascriptURI(会除去除之外的大部分标记)注入任意Web脚本或HTML。
|漏洞EXP
source: http://www.securityfocus.com/bid/16246/info

Bit 5 Blog is prone to an HTML injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in dynamically generated content.

Attacker-supplied HTML and script code would be executed in the context of the affected Web site, potentially allowing for theft of cookie-based authentication credentials. An attacker could also exploit this issue to control how the site is rendered to the user; other attacks are also possible. 

The following proof of concept is available:
<a href=javascript:alert(123)>clickme</a>
|参考资料

来源:BID
名称:16246
链接:http://www.securityfocus.com/bid/16246
来源:BUGTRAQ
名称:20060115[eVuln]Bit5BlogJavaScriptInsertionVulnerability
链接:http://www.securityfocus.com/archive/1/archive/1/421994/100/0/threaded
来源:OSVDB
名称:22446
链接:http://www.osvdb.org/22446
来源:VUPEN
名称:ADV-2006-0195
链接:http://www.frsirt.com/english/advisories/2006/0195
来源:SECUNIA
名称:18464
链接:http://secunia.com/advisories/18464
来源:MISC
链接:http://evuln.com/vulns/32/summary/
来源:MISC
链接:http://evuln.com/vulns/32/exploit
来源:XF
名称:bit5blog-addcomment-xss(24129)
链接:http://xforce.iss.net/xforce/xfdb/24129