Softbiz Banner Exchange多个跨站脚本攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1110533 漏洞类型 跨站脚本
发布时间 2006-06-29 更新时间 2006-07-19
CVE编号 CVE-2006-3607 CNNVD-ID CNNVD-200607-247
漏洞平台 PHP CVSS评分 4.3
|漏洞来源
https://www.exploit-db.com/exploits/28140
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200607-247
|漏洞详情
SoftbizBannerExchangeScript(又称BannerExchangeNetworkScript)1.0存在多个跨站脚本攻击(XSS)漏洞。远程攻击者可以借助(1)(a)insertmember.php中的city参数,以及(2)(b)lostpassword.php,(c)gen_confirm_mem.php和(d)index.php中的PHPSESSIDcookie,注入任意Web脚本或HTML。
|漏洞EXP
source: http://www.securityfocus.com/bid/18735/info
   
Softbiz Banner Exchange is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input before displaying it to users of the application.
   
An attacker may leverage these issues to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

GET http://www.example.com:80/index.php HTTP/1.0
Accept: */*
Host: www.example.com 
Cookie: PHPSESSID="><script>alert(/Ellipsis+Security+Test/)</script>
|参考资料

来源:XF
名称:softbizbannerexchange-multiple-xss(27461)
链接:http://xforce.iss.net/xforce/xfdb/27461
来源:XF
名称:softbizbannerexchange-insertmember-xss(27460)
链接:http://xforce.iss.net/xforce/xfdb/27460
来源:BID
名称:18735
链接:http://www.securityfocus.com/bid/18735
来源:BUGTRAQ
名称:20060629SoftbizBannerExchange1.0XSS
链接:http://www.securityfocus.com/archive/1/archive/1/438705/100/200/threaded
来源:MISC
链接:http://ellsec.org/print.php?type=N&item_id=141