PHPmyfamily 'Track.PHP'跨站脚本攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1109976 漏洞类型 跨站脚本
发布时间 2006-03-28 更新时间 2006-03-28
CVE编号 CVE-2006-1425 CNNVD-ID CNNVD-200603-470
漏洞平台 PHP CVSS评分 4.3
|漏洞来源
https://www.exploit-db.com/exploits/27494
https://cxsecurity.com/issue/WLB-2006030122
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200603-470
|漏洞详情
在phpmyfamily1.4.1的track.php中存在跨站脚本攻击(XSS)漏洞,远程攻击者可通过name参数注入任意Web脚本或HTML。
|漏洞EXP
source: http://www.securityfocus.com/bid/17278/info

The 'phpmyfamily' application is prone to a cross-site scripting vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input. 

An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

http://www.example.com/track.php?person=00001&name=[code]&email=1&action=sub&submit=Wy%B6lij
|参考资料

来源:BUGTRAQ
名称:20060327HYSA-2006-007phpmyfamily1.4.1CRLFinjection&XSS
链接:http://www.securityfocus.com/archive/1/archive/1/428901/100/0/threaded
来源:FULLDISC
名称:20060327HYSA-2006-007phpmyfamily1.4.1CRLFinjection&XSS
链接:http://marc.theaimsgroup.com/?l=full-disclosure&m=114344921211241&w=2
来源:XF
名称:phpmyfamily-track-xss(25476)
链接:http://xforce.iss.net/xforce/xfdb/25476
来源:BID
名称:17278
链接:http://www.securityfocus.com/bid/17278
来源:OSVDB
名称:24166
链接:http://www.osvdb.org/24166
来源:VUPEN
名称:ADV-2006-1130
链接:http://www.frsirt.com/english/advisories/2006/1130
来源:SREASON
名称:636
链接:http://securityreason.com/securityalert/636
来源:SECUNIA
名称:19409
链接:http://secunia.com/advisories/19409