Aweb Banner Generato index.php 跨站脚本攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1110017 漏洞类型 跨站脚本
发布时间 2006-04-07 更新时间 2006-04-12
CVE编号 CVE-2006-1699 CNNVD-ID CNNVD-200604-145
漏洞平台 PHP CVSS评分 2.6
|漏洞来源
https://www.exploit-db.com/exploits/27582
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200604-145
|漏洞详情
AwebBannerGenerator3.0及早期版本中的index.php存在跨站脚本攻击(XSS)漏洞。这使得远程攻击者可以在查看模式下借助于banner参数注入任意Web脚本或HTML。
|漏洞EXP
source: http://www.securityfocus.com/bid/17416/info

AWeb's Banner Generator is prone to a cross-site scripting vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input. 

An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

http://www.example.com/banniere/index.php?mode=view&save=1&size=&text=&banner=%3Cscript%3Ealert%28document.cookie%29%3C%2Fscript%3E&x=&y=&font=&RGBr=&RGBg=&RGBb=&angle=
|参考资料

来源:BID
名称:17416
链接:http://www.securityfocus.com/bid/17416
来源:SECTRACK
名称:1015877
链接:http://securitytracker.com/id?1015877
来源:XF
名称:awebbannergenerator-index-xss(25782)
链接:http://xforce.iss.net/xforce/xfdb/25782
来源:VUPEN
名称:ADV-2006-1348
链接:http://www.frsirt.com/english/advisories/2006/1348
来源:SECUNIA
名称:19621
链接:http://secunia.com/advisories/19621