Geeklog getimage.php 跨站脚本攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1110252 漏洞类型 跨站脚本
发布时间 2006-05-11 更新时间 2006-05-31
CVE编号 CVE-2006-2699 CNNVD-ID CNNVD-200605-546
漏洞平台 PHP CVSS评分 6.8
|漏洞来源
https://www.exploit-db.com/exploits/27919
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200605-546
|漏洞详情
Geeklog1.4.0sr2及之前版本的getimage.php存在跨站脚本攻击漏洞。远程攻击者可以借助show动作中的image自变量,注入任意HTML或Web脚本。
|漏洞EXP
source: http://www.securityfocus.com/bid/18154/info

Geeklog is prone to multiple input-validation vulnerabilities. The issues include cross-site scripting and SQL-injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input. 

A successful exploit of these vulnerabilities could allow an attacker to compromise the application, access or modify data, steal cookie-based authentication credentials, or even exploit vulnerabilities in the underlying database implementation. Other attacks are also possible.

Geeklog version 1.4.0sr2 is vulnerable; other versions may also be affected.

http://www.example.com/geeklog/getimage.php?mode=show&image=./<IMG%20SRC=JaVaScRiPt:alert(document.cookie)>
|参考资料

来源:BID
名称:18154
链接:http://www.securityfocus.com/bid/18154
来源:www.geeklog.net
链接:http://www.geeklog.net/index.php?topic=Security
来源:VUPEN
名称:ADV-2006-2050
链接:http://www.frsirt.com/english/advisories/2006/2050
来源:SECUNIA
名称:20316
链接:http://secunia.com/advisories/20316
来源:MISC
链接:http://kapda.ir/advisory-336.html
来源:BUGTRAQ
名称:20060529[KAPDA::#45]-geeklogmultiplevulnerabilities
链接:http://www.securityfocus.com/archive/1/archive/1/435295/100/0/threaded
来源:XF
名称:geeklog-getimage-xss(26862)
链接:http://xforce.iss.net/xforce/xfdb/26862
来源:SREASON
名称:993
链接:http://securityreason.com/securityalert/993