Pixelpost 跨站脚本攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1109667 漏洞类型 跨站脚本
发布时间 2006-01-24 更新时间 2006-01-25
CVE编号 CVE-2006-0409 CNNVD-ID CNNVD-200601-306
漏洞平台 PHP CVSS评分 4.3
|漏洞来源
https://www.exploit-db.com/exploits/27123
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200601-306
|漏洞详情
PixelpostPhotoblog1.4.3的index.php中存在跨站脚本攻击漏洞,远程攻击者可以通过评论弹出窗口中的"添加评论"字段注入任意Web脚本或HTML。
|漏洞EXP
source: http://www.securityfocus.com/bid/16362/info

Pixelpost is prone to an HTML injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in dynamically generated content.

Attacker-supplied HTML and script code would be executed in the context of the affected Web site, potentially allowing for theft of cookie-based authentication credentials. An attacker could also exploit this issue to control how the site is rendered to the user; other attacks are also possible.

An example exploit has been provided:

http://www.example.com/pixelpost/index.php? popup=comment&showimage=1

Add Comment: <XSS>
|参考资料

来源:XF
名称:pixelpost-index-xss(24261)
链接:http://xforce.iss.net/xforce/xfdb/24261
来源:BID
名称:16362
链接:http://www.securityfocus.com/bid/16362
来源:VUPEN
名称:ADV-2006-0309
链接:http://www.frsirt.com/english/advisories/2006/0309
来源:SECUNIA
名称:18572
链接:http://secunia.com/advisories/18572
来源:MISC
链接:http://evuln.com/vulns/45/summary.html
来源:BUGTRAQ
名称:20060123[eVuln]PixelpostPhotoblogXSSVulnerability
链接:http://www.securityfocus.com/archive/1/archive/1/423384/100/0/threaded
来源:SECTRACK
名称:1015529
链接:http://securitytracker.com/id?1015529