SMF 'Index.PHP'多个跨站攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1112045 漏洞类型 跨站脚本
发布时间 2007-01-20 更新时间 2007-02-02
CVE编号 CVE-2007-0399 CNNVD-ID CNNVD-200701-381
漏洞平台 PHP CVSS评分 6.0
|漏洞来源
https://www.exploit-db.com/exploits/29499
https://www.securityfocus.com/bid/22143
https://cxsecurity.com/issue/WLB-2007010084
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200701-381
|漏洞详情
SimpleMachinesForum(SMF)1.1RC3的index.php中存在多个跨站攻击漏洞。当在pm操作中中选择发送时,远程认证用户可以借助(1)接受器或(2)BCC字段,注入任意的web脚本或HTML。
|漏洞EXP
source: http://www.securityfocus.com/bid/22143/info

SMF is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content.

Attacker-supplied HTML and script code would execute in the context of the affected website, potentially allowing an attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user; other attacks are also possible.

NOTE: To trigger this vulnerability, the attacker must log in with a valid account.

http://www.example.com/smf/index.php?action=pm;sa=send
|受影响的产品
Simple Machines SMF 1.1.1 Simple Machines SMF 1.1 rc3
|参考资料

来源:BUGTRAQ
名称:20070120SMF"index.php?action=pm"CrossSite-Scripting
链接:http://www.securityfocus.com/archive/1/archive/1/457508/100/0/threaded
来源:OSVDB
名称:32606
链接:http://osvdb.org/32606
来源:MISC
链接:http://aria-security.com/forum/showthread.php?p=128
来源:XF
名称:smf-pm-xss(31612)
链接:http://xforce.iss.net/xforce/xfdb/31612
来源:BID
名称:22143
链接:http://www.securityfocus.com/bid/22143
来源:BUGTRAQ
名称:20070202Re:SMF"index.php?action=pm"CrossSite-Scripting
链接:http://www.securityfocus.com/archive/1/archive/1/458904/100/0/threaded
来源:BUGTRAQ
名称:20070126Re:Re:Re:Re:SMF"index.php?action=pm"CrossSite-Scripting
链接:http://www.securityfocus.com/archive/1/archive/1/458194/100/100/threaded
来源:BUGTRAQ
名称:20070122Re:Re:Re:SMF"index.php?action=pm"CrossSite-Scripting
链接:http://www.securityfocus.com/archive/1/archive/1/457761/100/200/threaded
来源:BUGTRAQ
名称:20070121Re:SMF"index.php?action=pm"CrossSite-Scripting
链接:http://www.securityfocus.com/archive/1/archive/1/457627/100/0/threaded
来源:SREASON
名称:2169
链接:http://secu