Tritanium Bulletin Board register.php 多个跨站脚本攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1110041 漏洞类型 跨站脚本
发布时间 2006-04-11 更新时间 2006-04-13
CVE编号 CVE-2006-1768 CNNVD-ID CNNVD-200604-217
漏洞平台 PHP CVSS评分 5.1
|漏洞来源
https://www.exploit-db.com/exploits/27626
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200604-217
|漏洞详情
TritaniumBulletinBoard(TBB)1.2.3中的register.php存在多个跨站脚本攻击漏洞。这使得远程攻击者可以在faction=register模式下借助于index.php中的参数(1)newuser_name、(2)newuser_email以及(3)newuser_hp注入任意Web脚本或HTML。
|漏洞EXP
source: http://www.securityfocus.com/bid/17473/info

Tritanium Bulletin Board is prone to multiple cross-site scripting vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input. 

An attacker may leverage these issues to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

http://www.example.com/index.php?faction=register&newuser_name=[XSS]
http://www.example.com/index.php?faction=register&newuser_email=[XSS]
http://www.example.com/index.php?faction=register&newuser_hp=[XSS]
|参考资料

来源:BID
名称:17473
链接:http://www.securityfocus.com/bid/17473
来源:BUGTRAQ
名称:20060411TritaniumBulletinBoard1.2.3-XSS
链接:http://www.securityfocus.com/archive/1/archive/1/430669/100/0/threaded
来源:XF
名称:tritaniumbb-register-xss(25751)
链接:http://xforce.iss.net/xforce/xfdb/25751
来源:OSVDB
名称:24556
链接:http://www.osvdb.org/24556
来源:VUPEN
名称:ADV-2006-1329
链接:http://www.frsirt.com/english/advisories/2006/1329
来源:SECUNIA
名称:19635
链接:http://secunia.com/advisories/19635