PSY 'email_request.php' 跨站脚本攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1110276 漏洞类型 跨站脚本
发布时间 2006-05-15 更新时间 2007-02-12
CVE编号 CVE-2006-7004 CNNVD-ID CNNVD-200702-202
漏洞平台 PHP CVSS评分 6.8
|漏洞来源
https://www.exploit-db.com/exploits/27870
https://www.securityfocus.com/bid/82134
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200702-202
|漏洞详情
PSYAuction的email_request.php中存在跨站脚本攻击漏洞。远程攻击者可以借助user_id参数,注入任意web脚本或HTML。
|漏洞EXP
source: http://www.securityfocus.com/bid/17974/info
 
PSY Auction is prone to multiple input-validation vulnerabilities. The issues include HTML-injection and SQL-injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input. 
 
Successful exploits of these vulnerabilities could allow an attacker to compromise the application, access or modify data, steal cookie-based authentication credentials, control how the site is rendered to the user, or exploit vulnerabilities in the underlying database implementation. Other attacks are also possible.
 
http://www.example.com/auction/email_request.php?user_id=[malicious code]
|受影响的产品
PHP Script Tools PSY Auction 0
|参考资料

来源:MISC
链接:http://www.securityfocus.com/data/vulnerabilities/exploits/PSYAuction-0515-sql-html.txt
来源:BID
名称:17974
链接:http://www.securityfocus.com/bid/17974
来源:OSVDB
名称:36360
链接:http://www.osvdb.org/36360