Gastebuch跨站脚本攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1109738 漏洞类型 跨站脚本
发布时间 2006-02-13 更新时间 2020-02-19
CVE编号 CVE-2006-0706 CNNVD-ID CNNVD-200602-208
漏洞平台 PHP CVSS评分 4.3
|漏洞来源
https://www.exploit-db.com/exploits/27209
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200602-208
|漏洞详情
Gstebuch (Gastebuch) 1.3.3之前版本的eintrag.php中存在跨站脚本攻击漏洞。远程攻击者可以借助在homepage参数中使用的URL注入任意Web脚本或HTML。
|漏洞EXP
source: http://www.securityfocus.com/bid/16615/info

Gastebuch is prone to a cross-site scripting vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before including it in dynamically generated HTML content.

An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.

Gastebuch version 1.3.2 is vulnerable to this issue; prior versions may also be affected.

http://www.example.com/"<script>alert(123)</script>"
|参考资料

来源:XF
名称:gastebuch-homepage-xss(24670)
链接:http://xforce.iss.net/xforce/xfdb/24670
来源:BID
名称:16615
链接:http://www.securityfocus.com/bid/16615
来源:VUPEN
名称:ADV-2006-0566
链接:http://www.frsirt.com/english/advisories/2006/0566
来源:SECUNIA
名称:18849
链接:http://secunia.com/advisories/18849
来源:BUGTRAQ
名称:20060213XSSvulnerabilityinguestbook-php-script
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=113986789801121&w=2
来源:BUGTRAQ
名称:20060213XSSvulnerabilityinguestbook-php-script
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=113986789801121&w=2
来源:BUGTRAQ
名称:20060213XSSvulnerabilityinguestbook-php-script
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=113986789801121&w=2
来源:BUGTRAQ
名称:20060213XSSvulnerabilityinguestbook-php-script
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=113986789801121&w=2
来源:BUGTRAQ
名称:20060213XSSvulnerabilityinguestbook-php-script
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=113986789801121&w=2
来源:BUGTRAQ
名称:20060213XSSvulnerabilityinguestbook-php-script
链接:http://marc.theaimsgroup.c