RI Blog 'Search.ASP' 跨站脚本攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1111944 漏洞类型 跨站脚本
发布时间 2007-01-05 更新时间 2007-01-11
CVE编号 CVE-2007-0121 CNNVD-ID CNNVD-200701-050
漏洞平台 PHP CVSS评分 6.8
|漏洞来源
https://www.exploit-db.com/exploits/29384
https://cxsecurity.com/issue/WLB-2007010024
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200701-050
|漏洞详情
RIBlog1.3版本的search.asp中存在跨站脚本攻击漏洞。远程攻击者可以借助Q参数,注入任意的web脚本或HTML。
|漏洞EXP
source: http://www.securityfocus.com/bid/21880/info

RI Blog is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input. 

An attacker may leverage this issue to have arbitrary script code execute in the browser of an unsuspecting user. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

Version 1.3 is vulnerable; other versions may also be affected.

http://www.example.com/BlogPath/search.asp?q=<script>alert(document.cookie);</script>
|参考资料

来源:BID
名称:21880
链接:http://www.securityfocus.com/bid/21880
来源:BUGTRAQ
名称:20070105RIBlog1.3XSSVuln.
链接:http://www.securityfocus.com/archive/1/archive/1/456052/100/0/threaded
来源:OSVDB
名称:31637
链接:http://osvdb.org/31637
来源:XF
名称:riblog-search-xss(31317)
链接:http://xforce.iss.net/xforce/xfdb/31317
来源:VUPEN
名称:ADV-2007-0083
链接:http://www.frsirt.com/english/advisories/2007/0083
来源:SREASON
名称:2108
链接:http://securityreason.com/securityalert/2108
来源:SECUNIA
名称:23657
链接:http://secunia.com/advisories/23657