EditTag Plain Parameter 多个跨站脚本攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1111940 漏洞类型 跨站脚本
发布时间 2007-01-05 更新时间 2007-01-11
CVE编号 CVE-2007-0119 CNNVD-ID CNNVD-200701-052
漏洞平台 CGI CVSS评分 6.8
|漏洞来源
https://www.exploit-db.com/exploits/29396
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200701-052
|漏洞详情
EditTag1.2版本中存在多个跨站攻击漏洞。远程攻击者可以借助提交到(1)mkpw_mp.cgi,(2)mkpw.pl或(3)mkpw.cgi的plain参数,注入任意的web脚本或HTML。
|漏洞EXP
source: http://www.securityfocus.com/bid/21891/info
  
EditTag is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. 
  
An attacker may leverage these issues to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
  
http://www.example.com/edittag/mkpw.cgi?plain=XSS
|参考资料

来源:BID
名称:21891
链接:http://www.securityfocus.com/bid/21891
来源:BUGTRAQ
名称:20070105MultiplebugsinEditTag
链接:http://www.securityfocus.com/archive/1/archive/1/456055/100/0/threaded
来源:OSVDB
名称:33392
链接:http://osvdb.org/33392
来源:OSVDB
名称:33391
链接:http://osvdb.org/33391
来源:OSVDB
名称:33390
链接:http://osvdb.org/33390
来源:SECUNIA
名称:7950
链接:http://secunia.com/advisories/7950