Open Business Management 多个跨站脚本攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1110419 漏洞类型 跨站脚本
发布时间 2006-06-07 更新时间 2006-06-19
CVE编号 CVE-2006-3009 CNNVD-ID CNNVD-200606-287
漏洞平台 PHP CVSS评分 5.8
|漏洞来源
https://www.exploit-db.com/exploits/27998
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200606-287
|漏洞详情
OpenBusinessManagement(OBM)1.0.3pl1存在多个跨站脚本攻击(XSS)漏洞,远程攻击者可通过传给诸如(a)publication/publication_index.php,(b)group/group_index.php,(c)user/user_index.php,(d)list/list_index.php和(e)company/company_index.php等文件的(1)tf_lang,(2)tf_name,(3)tf_user,(4)tf_lastname,(5)tf_contact,(6)tf_datebefore和(7)tf_dateafter参数,来注人任意HTML或Web脚本。
|漏洞EXP
source: http://www.securityfocus.com/bid/18348/info
    
Open Business Management is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize HTML and script code from user-supplied input to several parameters before returning to the user.
    
    
An attacker could exploit this vulnerability to inject hostile HTML and script code into the browser session of other users of the application.

http://obm-host/company/company_index.php?action=search&tf_name=&tf_phone=&sel_kind=&sel_cat=&tf_cat_code=&cb_cat_tree=&sel_act=&sel_naf=&tf_zip=&cb_archive=&sel_market=&tf_town=&sel_ctry=&sel
_dsrc=&tf_dateafter=&tf_datebefore=[XSS]
http://obm-host/company/company_index.php?action=search&tf_name=&tf_phone=&sel_kind=&sel_cat=&tf_cat_code=&cb_cat_tree=&sel_act=&sel_naf=&tf_zip=&cb_archive=&sel_market=&tf_town=&sel_ctry=&sel
_dsrc=&tf_dateafter=[XSS]
|参考资料

来源:XF
名称:obm-multiple-scripts-xss(27031)
链接:http://xforce.iss.net/xforce/xfdb/27031
来源:BID
名称:18348
链接:http://www.securityfocus.com/bid/18348
来源:OSVDB
名称:26202
链接:http://www.osvdb.org/26202
来源:OSVDB
名称:26201
链接:http://www.osvdb.org/26201
来源:OSVDB
名称:26200
链接:http://www.osvdb.org/26200
来源:OSVDB
名称:26199
链接:http://www.osvdb.org/26199
来源:OSVDB
名称:26198
链接:http://www.osvdb.org/26198
来源:SECUNIA
名称:20486
链接:http://secunia.com/advisories/20486
来源:MISC
链接:http://pridels0.blogspot.com/2006/06/obm-multiple-sql-inj-and-xss-vuln.html