SoftBB 'index.php' 跨站脚本攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1110951 漏洞类型 跨站脚本
发布时间 2006-09-05 更新时间 2006-09-15
CVE编号 CVE-2006-4593 CNNVD-ID CNNVD-200609-090
漏洞平台 PHP CVSS评分 6.8
|漏洞来源
https://www.exploit-db.com/exploits/28490
https://cxsecurity.com/issue/WLB-2006090039
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200609-090
|漏洞详情
SoftBB是一套基于Web的论坛程序。SoftBBv0.1中存在多个输入验证错误,如下:1)在SQL查询时没有正确的验证对/addmembre.php文件中groupe参数及/moveto.php文件中select参数的输入,允许攻击者执行SQL注入攻击。2)在PHP脚本中存储之前没有正确过滤对admin/save_opt.php中多个参数的输入,允许攻击者执行任意PHP代码。成功攻击可能要求管理员权限。3)对index.php中page参数的输入没有正确的处理空的或无效的参数,攻击者可以判断安装路径。
|漏洞EXP
source: http://www.securityfocus.com/bid/19847/info

SoftBB is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input. 

An attacker may leverage this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

http://www.example.com/index.php?page=<script>alert('hacking%20xss')</script>
|参考资料

来源:BID
名称:19847
链接:http://www.securityfocus.com/bid/19847
来源:BUGTRAQ
名称:20060904SoftBBv0.1<=Cross-SiteScripting
链接:http://www.securityfocus.com/archive/1/archive/1/445157/100/0/threaded
来源:SECTRACK
名称:1016797
链接:http://securitytracker.com/id?1016797
来源:OSVDB
名称:29886
链接:http://www.osvdb.org/29886
来源:SREASON
名称:1511
链接:http://securityreason.com/securityalert/1511