Enthrallweb Ehomes result.asp 多个跨站脚本攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1111613 漏洞类型 跨站脚本
发布时间 2006-11-20 更新时间 2006-12-01
CVE编号 CVE-2006-6205 CNNVD-ID CNNVD-200611-525
漏洞平台 ASP CVSS评分 6.8
|漏洞来源
https://www.exploit-db.com/exploits/29124
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200611-525
|漏洞详情
EnthrallwebeHomes中的result.asp存在多个跨站脚本攻击(XSS)漏洞,远程攻击者可以通过(1)city或(2)State参数来注入任意Web脚本或HTML。
|漏洞EXP
source: http://www.securityfocus.com/bid/21193/info
   
eHome is prone to multiple input-validation vulnerabilities, including cross-site scripting, and SQL-injection issues, because the application fails to properly sanitize user-supplied input. 
   
A successful exploit of these vulnerabilities could allow an attacker to compromise the application, access or modify data, steal cookie-based authentication credentials, or even exploit vulnerabilities in the underlying database implementation. Other attacks are also possible.
   
http://www.example.com/result.asp?city=[xss]
http://www.example.com/result.asp?city=1&cat=2&imageField2=1&State=[xss]
|参考资料

来源:XF
名称:ehomes-result-xss(30420)
链接:http://xforce.iss.net/xforce/xfdb/30420
来源:BID
名称:21193
链接:http://www.securityfocus.com/bid/21193
来源:BUGTRAQ
名称:20061120ehomes[multiplesinjectionssql]
链接:http://www.securityfocus.com/archive/1/archive/1/452107/100/100/threaded
来源:VUPEN
名称:ADV-2006-4643
链接:http://www.frsirt.com/english/advisories/2006/4643
来源:SECUNIA
名称:23016
链接:http://secunia.com/advisories/23016
来源:MISC
链接:http://s-a-p.ca/index.php?page=OurAdvisories&id=50
来源:SREASON
名称:1942
链接:http://securityreason.com/securityalert/1942