DCP-Portal SE 多个跨站脚本攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1111033 漏洞类型 跨站脚本
发布时间 2006-09-14 更新时间 2006-09-19
CVE编号 CVE-2006-4838 CNNVD-ID CNNVD-200609-290
漏洞平台 PHP CVSS评分 4.3
|漏洞来源
https://www.exploit-db.com/exploits/28572
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200609-290
|漏洞详情
DCP-PortalSE6.0中存在多个跨站脚本攻击(XSS)漏洞,远程攻击者可以通过(a)admin/inc/footer.inc.php中的(1)root_url和(2)dcp_version参数,以及(b)admin/inc/header.inc.php中的root_url、(3)page_top_name、(4)page_name和(5)page_options参数注入任意Web脚本或HTML。
|漏洞EXP
source: http://www.securityfocus.com/bid/20024/info
 
DCP-Portal is prone to multiple input-validation vulnerabilities, including multiple cross-site scripting, SQL-injection, and remote file-include issues, because the application fails to sanitize user-supplied input. 
 
A successful exploit of these vulnerabilities could allow an attacker to compromise the application, access or modify data, steal cookie-based authentication credentials, exploit vulnerabilities in the underlying database implementation, or include an arbitrary remote file containing malicious PHP code and execute it in the context of the webserver process. Other attacks are also possible.
 
Version 6.0 Standard Edition is vulnerable to these issues; other versions may also be affected.

http://www.example.com/admin/inc/header.inc.php?root_url="><Script>alert(document.cookie);</script><"
http://www.example.com/admin/inc/header.inc.php?page_top_name=<Script>alert(document.cookie);</script>
http://www.example.com/admin/inc/header.inc.php?page_name=<Script>alert(document.cookie);</script>
http://www.example.com/admin/inc/header.inc.php?page_options=<Script>alert(document.cookie);</script>
|参考资料

来源:BID
名称:20024
链接:http://www.securityfocus.com/bid/20024
来源:BUGTRAQ
名称:20060914DCP-PortalSE6.0multipleinjections
链接:http://www.securityfocus.com/archive/1/archive/1/445996/100/0/threaded
来源:SREASON
名称:1585
链接:http://securityreason.com/securityalert/1585