RunCMS Ratefile.PHP跨站脚本攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1109795 漏洞类型 跨站脚本
发布时间 2006-02-22 更新时间 2006-02-24
CVE编号 CVE-2006-0875 CNNVD-ID CNNVD-200602-384
漏洞平台 PHP CVSS评分 5.0
|漏洞来源
https://www.exploit-db.com/exploits/27256
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200602-384
|漏洞详情
RunCMS1.3a5的ratefile.php中存在跨站脚本攻击漏洞。远程攻击者可以借助lid参数注入任意Web脚本或HTML。
|漏洞EXP
source: http://www.securityfocus.com/bid/16769/info

RunCMS is prone to a cross-site scripting vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input. 

An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.

http://www.example.com/public/modules/downloads/ratefile.php?lid={number}">[code]
|参考资料

来源:BID
名称:16769
链接:http://www.securityfocus.com/bid/16769
来源:BUGTRAQ
名称:20060222[KAPDA::#27]-Runcms1.xCross_Site_Scriptingvulnerability
链接:http://www.securityfocus.com/archive/1/archive/1/425775/100/0/threaded
来源:VUPEN
名称:ADV-2006-0694
链接:http://www.frsirt.com/english/advisories/2006/0694
来源:SECTRACK
名称:1015663
链接:http://securitytracker.com/id?1015663
来源:SECUNIA
名称:18997
链接:http://secunia.com/advisories/18997
来源:MISC
链接:http://kapda.ir/advisory-267.html
来源:XF
名称:runcms-ratefile-xss(24871)
链接:http://xforce.iss.net/xforce/xfdb/24871
来源:OSVDB
名称:23388
链接:http://www.osvdb.org/23388