Odysseus Blog 'Blog.PHP ' 跨站脚本攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1111573 漏洞类型 跨站脚本
发布时间 2006-11-16 更新时间 2007-01-23
CVE编号 CVE-2006-6951 CNNVD-ID CNNVD-200701-353
漏洞平台 PHP CVSS评分 6.8
|漏洞来源
https://www.exploit-db.com/exploits/29050
https://cxsecurity.com/issue/WLB-2007010088
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200701-353
|漏洞详情
OdysseusBlog的blog.php中存在跨站脚本攻击漏洞。远程攻击者可以借助页参数,注入任意的web脚本或HTML。
|漏洞EXP
source: http://www.securityfocus.com/bid/21128/info

Odysseus Blog is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied input.

An attacker may leverage this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may help the attacker to steal cookie-based authentication credentials and launch other attacks.

Version 1.0.0 is vulnerable; other versions may also be affected.

http://www.example.com/[path]/blog.php?page="><script>alert('Xmors')</script><
|参考资料

来源:XF
名称:odysseusblog-blog-xss(30333)
链接:http://xforce.iss.net/xforce/xfdb/30333
来源:BID
名称:21128
链接:http://www.securityfocus.com/bid/21128
来源:VIM
名称:20070122oldOdysseusBlogXSSreport-possiblyincorrect
链接:http://www.attrition.org/pipermail/vim/2007-January/001250.html
来源:BUGTRAQ
名称:20061116OdysseusBlog=>1.0.0CrossSiteScripting
链接:http://archives.neohapsis.com/archives/bugtraq/2006-11/0274.html
来源:SREASON
名称:2173
链接:http://securityreason.com/securityalert/2173