ContentBoxx Login.PHP 跨站脚本攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1110093 漏洞类型 跨站脚本
发布时间 2006-04-19 更新时间 2006-04-25
CVE编号 CVE-2006-1971 CNNVD-ID CNNVD-200604-421
漏洞平台 PHP CVSS评分 4.3
|漏洞来源
https://www.exploit-db.com/exploits/27688
https://cxsecurity.com/issue/WLB-2006040067
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200604-421
|漏洞详情
KRANKIKOMContentBoxX中的login.php存在跨站脚本攻击漏洞。这使得远程攻击者可以借助于action参数注入任意Web脚本或HTML。
|漏洞EXP
source: http://www.securityfocus.com/bid/17612/info

ContentBoxx is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. 

An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

http://www.example.com/cms/login.php?action=XSS
|参考资料

来源:BID
名称:17612
链接:http://www.securityfocus.com/bid/17612
来源:BUGTRAQ
名称:20060419ContentBoxxLogin.phpCross-SiteScripting
链接:http://www.securityfocus.com/archive/1/archive/1/431386/100/0/threaded
来源:VUPEN
名称:ADV-2006-1438
链接:http://www.frsirt.com/english/advisories/2006/1438
来源:SECUNIA
名称:19733
链接:http://secunia.com/advisories/19733
来源:XF
名称:contentboxx-login-xss(25952)
链接:http://xforce.iss.net/xforce/xfdb/25952
来源:OSVDB
名称:24768
链接:http://www.osvdb.org/24768
来源:SREASON
名称:779
链接:http://securityreason.com/securityalert/779
来源:SREASON
名称:740
链接:http://securityreason.com/securityalert/740