CPAINT TYPE.PHP跨站脚本攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1109711 漏洞类型 跨站脚本
发布时间 2006-02-08 更新时间 2006-02-13
CVE编号 CVE-2006-0650 CNNVD-ID CNNVD-200602-145
漏洞平台 PHP CVSS评分 4.3
|漏洞来源
https://www.exploit-db.com/exploits/27173
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200602-145
|漏洞详情
CPAINTlibrary2.0.3之前版本的cpaint2.inc.php中存在跨站脚本攻击(XSS)漏洞,在多个脚本中使用时,远程攻击者可以借助显示在结果出错信息中的cpaint_response_type参数注入任意web脚本或HTML,如使用十六进制编码的IFRAME变量演示的那样。
|漏洞EXP
source: http://www.securityfocus.com/bid/16559/info

CPAINT is prone to a cross-site scripting vulnerability.

This issue affects the 'type.php' script and may facilitate the theft of cookie-based authentication credentials as well as other attacks.


CPAINT 2.0.2 and prior versions are affected.

http://www.example.com/examples/type/type.php?cpaint_response_type=%3Ciframe%20src=http://www.gulftech.org/%3E
|参考资料

来源:XF
名称:cpaint-response-type-xss(24594)
链接:http://xforce.iss.net/xforce/xfdb/24594
来源:BUGTRAQ
名称:20060210CPAINTAJAXLibraryCrossSiteScripting
链接:http://www.securityfocus.com/archive/1/archive/1/424663/100/0/threaded
来源:MISC
链接:http://www.gulftech.org/?node=research&article_id=00097-02092006
来源:VUPEN
名称:ADV-2006-0487
链接:http://www.frsirt.com/english/advisories/2006/0487
来源:SECUNIA
名称:18765
链接:http://secunia.com/advisories/18765
来源:cpaint.booleansystems.com
链接:http://cpaint.booleansystems.com/forums/viewtopic.php?t=98
来源:BID
名称:16559
链接:http://www.securityfocus.com/bid/16559
来源:SECTRACK
名称:1015608
链接:http://securitytracker.com/id?1015608