VBZooM Forum多个跨站脚本攻击注入漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1109852 漏洞类型 跨站脚本
发布时间 2006-03-04 更新时间 2006-03-13
CVE编号 CVE-2006-1133 CNNVD-ID CNNVD-200603-166
漏洞平台 PHP CVSS评分 4.3
|漏洞来源
https://www.exploit-db.com/exploits/27348
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200603-166
|漏洞详情
vbzoom1.11存在多个跨站脚本攻击(XSS)漏洞,远程攻击者可以借助(1)comment.php或(2)contact.php的UserID参数,注入任意Web脚本或HTML。
|漏洞EXP
source: http://www.securityfocus.com/bid/16956/info
 
VBZooM Forum is prone to multiple cross-site scripting vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input. 
 
An attacker may leverage any of these issues to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.

http://www.example.com/vz/contact.php?UserID='>XSS
|参考资料

来源:BUGTRAQ
名称:20060306SQLinjection&XSSINvbzoomv1.11
链接:http://www.securityfocus.com/archive/1/archive/1/426874/100/0/threaded
来源:XF
名称:vbzoom-comment-contact-xss(25090)
链接:http://xforce.iss.net/xforce/xfdb/25090
来源:BID
名称:16969
链接:http://www.securityfocus.com/bid/16969
来源:BID
名称:16956
链接:http://www.securityfocus.com/bid/16956
来源:OSVDB
名称:23813
链接:http://www.osvdb.org/23813
来源:OSVDB
名称:23812
链接:http://www.osvdb.org/23812
来源:SREASON
名称:552
链接:http://securityreason.com/securityalert/552