Lazarus Guestbook多个跨站脚本攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1110600 漏洞类型 跨站脚本
发布时间 2006-07-12 更新时间 2006-07-20
CVE编号 CVE-2006-3616 CNNVD-ID CNNVD-200607-234
漏洞平台 PHP CVSS评分 4.3
|漏洞来源
https://www.exploit-db.com/exploits/28212
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200607-234
|漏洞详情
CarbonizeLazarusGuestbook1.6及之前版本存在多个跨站脚本攻击(XSS)漏洞。远程攻击者可以借助现有文件名称后面的(1)codes-english.php中的show参数以及(2)picture.php中的img参数,注入任意Web脚本或HTML。
|漏洞EXP
source: http://www.securityfocus.com/bid/18956/info
 
Lazarus Guestbook is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. 
 
An attacker may leverage these issues to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
 
These issues affect version 1.6; other versions may also be vulnerable.

http://www.example.com/lazarusgb/picture.php?img=../img/home.gif%00%22%3E[XSS] 
http://www.example.com/lazarusgb/picture.php?img=../img/home.gif%00%22%3E<script>alert(document.cookie);</script>
|参考资料

来源:BID
名称:18956
链接:http://www.securityfocus.com/bid/18956
来源:BUGTRAQ
名称:20060712LazarusGuestbookCrossSiteScriptingVulnerabilities
链接:http://www.securityfocus.com/archive/1/archive/1/439904/100/0/threaded
来源:XF
名称:lazarus-picture-code-execute(27716)
链接:http://xforce.iss.net/xforce/xfdb/27716
来源:XF
名称:lazarus-codesenglish-xss(27714)
链接:http://xforce.iss.net/xforce/xfdb/27714
来源:OSVDB
名称:27090
链接:http://www.osvdb.org/27090
来源:OSVDB
名称:27089
链接:http://www.osvdb.org/27089
来源:VUPEN
名称:ADV-2006-2784
链接:http://www.frsirt.com/english/advisories/2006/2784
来源:SECTRACK
名称:1016486
链接:http://securitytracker.com/id?1016486
来源:SECUNIA
名称:21034
链接:http://secunia.com/advisories/21034