PHPWebNews m_txt参数多个跨站脚本攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1112646 漏洞类型 跨站脚本
发布时间 2007-04-07 更新时间 2007-04-27
CVE编号 CVE-2007-2300 CNNVD-ID CNNVD-200704-519
漏洞平台 PHP CVSS评分 4.3
|漏洞来源
https://www.exploit-db.com/exploits/29847
https://cxsecurity.com/issue/WLB-2007040150
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200704-519
|漏洞详情
EndyKristantoSuratkabar/NewsManagementOnline(又称phpwebnews)中存在多个跨站脚本攻击漏洞。远程攻击者可以借助提交到(1)iklan.php,(2)index.php或(3)bukutamu.php的m_txt参数,注入任意的web脚本或HTML。
|漏洞EXP
source: http://www.securityfocus.com/bid/23448/info
  
The 'phpwebnews' package is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.
  
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
  
This issue affects phpwebnews 0.1; other versions may also be affected. 

http://www.example.com/[path]/bukutamu.php?m_txt=[xss]
|参考资料

来源:XF
名称:phpwebnews-mtxt-xss(33641)
链接:http://xforce.iss.net/xforce/xfdb/33641
来源:BID
名称:23448
链接:http://www.securityfocus.com/bid/23448
来源:BUGTRAQ
名称:20070412phpwebnewsv.1MultipleCrossSiteScriptingVulnerabilites
链接:http://www.securityfocus.com/archive/1/archive/1/465545/100/0/threaded
来源:OSVDB
名称:35367
链接:http://www.osvdb.org/35367
来源:OSVDB
名称:35366
链接:http://www.osvdb.org/35366
来源:OSVDB
名称:35365
链接:http://www.osvdb.org/35365
来源:SREASON
名称:2643
链接:http://securityreason.com/securityalert/2643