Inside Systems Mail 'Error.PHP'跨站脚本攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1111716 漏洞类型 跨站脚本
发布时间 2006-12-04 更新时间 2006-12-07
CVE编号 CVE-2006-6364 CNNVD-ID CNNVD-200612-126
漏洞平台 PHP CVSS评分 6.8
|漏洞来源
https://www.exploit-db.com/exploits/29223
https://cxsecurity.com/issue/WLB-2006120061
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200612-126
|漏洞详情
InsideSystemsMail(ISMail)2.0及早期版本的error.php脚本存在跨站脚本攻击(XSS)漏洞,远程攻击者可借助error参数注入任意Web脚本或HTML。
|漏洞EXP
source: http://www.securityfocus.com/bid/21424/info

Inside Systems Mail is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input. 

An attacker may leverage this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

Version 2.0 is vulnerable; other versions may also be affected.

http://www.example.com/<path_to_ismail>/error.php?error=XSS%20attack%3Cscript%3Ealert(document.cookie);%3C/script%3E
|参考资料

来源:BUGTRAQ
名称:20061202[ISecAuditorsSecurityAdvisories]XSSvulnerabilityinerrorpageofISMail
链接:http://www.securityfocus.com/archive/1/archive/1/453420/100/0/threaded
来源:www.insidesystems.net
链接:http://www.insidesystems.net/projects/project.php?projectid=4
来源:VUPEN
名称:ADV-2006-4848
链接:http://www.frsirt.com/english/advisories/2006/4848
来源:SECUNIA
名称:23229
链接:http://secunia.com/advisories/23229
来源:BID
名称:21424
链接:http://www.securityfocus.com/bid/21424
来源:XF
名称:ismail-error-xss(30704)
链接:http://xforce.iss.net/xforce/xfdb/30704
来源:SREASON
名称:1990
链接:http://securityreason.com/securityalert/1990